Cyber Risks and Considerations for the Marine Insurance Industry Joseph G. Grasso David L. Hall February 26, 2015

Size: px
Start display at page:

Download "Cyber Risks and Considerations for the Marine Insurance Industry Joseph G. Grasso David L. Hall February 26, 2015"

Transcription

1 Cyber Risks and Considerations for the Marine Insurance Industry Joseph G. Grasso David L. Hall February 26, 2015 American Marine Insurance Forum

2 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 2 Topics Nature of marine and non-marine cyber risks Increased government oversight re: cyber security Cyber exposure in the marine and energy sectors Governmental regulation of cybersecurity, including U.S. Coast Guard (USCG) and Department of Homeland Security (DHS) Insurance coverage for cyber-risks, and exclusions

3 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 3 Cyber 9/11 As the country becomes ever more dependent on digital services for the functioning of critical infrastructure, business, education, finances, communications, and social connections, the Internet s vulnerabilities are outpacing the nation s ability to secure it. We are at September 10th levels in terms of cyber preparedness. Reflections on the Tenth Anniversary of the 9/11 Commission Report The Bipartisan Policy Center July 2014.

4 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 4 Notable Recent Cyber Attacks 2011 Sony Corporation Confidential information from 77 million+ PlayStation network accounts Global Payments, Inc. 1.5 million card accounts. $90 million in costs Target Corporation 40 million credit and debit card accounts. $200 million to reissue 21.8 million credit and debit cards Neiman Marcus 350,000 payment cards Home Depot 56 million debit and credit cards JP Morgan Chase 76 million households, 7 million small businesses ebay personal records of 233 million users Anthem Blue Cross

5 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 5 Factors at Work Big Data: data sets so large and complex that traditional data management tools and data processing applications are inadequate. Big Data managed by supervisory control and data acquisition (SCADA) and industrial control systems (ICS). Shareholder pressure to improve returns and reduce costs by increasing reliance on operational IT. Virtual world: geographic distribution of infrastructure (and maritime assets) requires use of IT. Increasing automation on board vessels Energy sector is targeted for cyber intrusions.

6 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY Who Uses Big Data in Marine Sectors? 6 Deepwater Exploration & Production (E&P) Onshore E&P Midstream Transportation Maritime Transportation Refining & Petrochemical Non-Marine/Non-Energy

7 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 7 Deepwater Exploration Vessels/MODUs GPS/DP requirements. Real time downhole data sensors temperature, pressure, vibration, flowmeters and acoustic. Remote control and monitoring of subsea control modules.

8 Components of a Software Intensive System Controlled Systems 8

9 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 9 Maritime Transportation Security and vessel traffic control GPS aided systems ECDIS navigation systems Smart containers

10 10 Potential Threats to the Marine Sector University of Texas researchers demonstrated in July 2013 that it is possible to change a vessel s direction by interfering with its GPS signal to cause the onboard navigation systems to falsely interpret a vessel s position and heading Hacker caused a floating oil platform off Africa to tilt to one side, forcing temporary shutdown. (Note this story is all over the Internet, and in the IMO report, but I was unable to verify the actual platform.) Somali pirates employed hackers to infiltrate a shipping company s cyber systems to identify vessels passing through the Gulf of Aden with valuable cargoes and minimal on-board security which led to the hijacking of at least one vessel All examples from a report submitted by Canada to the IMO in July 2014 (

11 11 Threats to the Marine Sector (continued) Denial of service attacks (initiating a very high number of requests to a system to overwhelm it and cause it to cease operating) against ports have been reported (Houston being one of them) Efforts to gain unauthorized access to wireless Internet networks in ports have been reported Studies by the Brookings Institute and the European Union agency for Network and Information Security both concluded that there is very little awareness of cybersecurity issues in the maritime transportation sector and few initiatives underway to enhance cybersecurity. All examples from a report submitted by Canada to the IMO in July 2014 (

12 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 12 Data Breach Requirements 47 different state rules on data breach reporting. Most states require notice to those whose private information is affected. Some states require reporting to state attorney general, which could trigger investigation of the company s cybersecurity programs. Notification to insurers? Federal guidelines and requirements: a patch work quilt. Federal Trade Commission (FTC) enforcement NIST Framework Other agencies are starting to weigh in: DoD and SEC Federal legislation has been debated without success

13 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 13 Data Breach Requirements (continued) Reporting creates complex relationship between reporting companies, regulators, and insurers. Fees/costs are significant Are they covered? What about fines?

14 CYBER RISKS AND CONSIDERATIONS FOR THE MARINE INSURANCE INDUSTRY 14 Growing Federal Interest 12 June 2013 Executive Order Improving Critical Infrastructure Cybersecurity. 12 Feb 2014 Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 National Institute of Standards and Technology (NIST). What is the safe harbor? What is the duty of care?

15 15 Growing Federal Interest (continued) Feb 2014 DHS/DOE Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG C2M2) Version 1.1. June 2014 SEC Commissioner Aguilar Addresses New York Stock Exchange Members Regarding Corporate Obligations Concerning Cyber Risks. July 2014 DHS Insurance Industry Working Session Readout Report Insurance for Cyber-Related Critical Infrastructure Loss: Key Issues.

16 U.S. Government s Response to Cyber Threats 16 In May 2013, the US Department of Commerce commissioned NIST to issue guidelines for SCADA and ICS systems. Unauthorized changes to instructions, commands, or alarm thresholds, which could damage, disable, or shut down equipment, create environmental impacts, and/or endanger human life Inaccurate information sent to system operators, either to disguise unauthorized changes, or to cause the operators to initiate inappropriate actions, which could have various negative effects Interference with the operation of safety systems, which could endanger human life

17 Corporate Responsibility to Manage Risks for Cyber Attacks 17 DHS Insurance Industry Working Session Readout Report, Insurance for Cyber- Related Critical Infrastructure Loss: Key Issues, July 2014.

18 U.S. Government s Response to Cyber Threats 12 December 2014 USCG and DHS issued notice of public meeting and requested comments on: 18 Developing cybersecurity assessment methods for vessels and facilities regulated by the USCG; and Cybersecurity vulnerabilities that could cause a Transportation Security Incident (TSI). TSI = a security incident resulting in a significant loss of life, environmental damage, transportation system disruption, or economic disruption in a particular area. USCG invited public comments in developing standards, guidelines, and best practices to protect maritime critical infrastructure.

19 U.S. Government s Response to Cyber Threats December 2014 USCG and DHS requested public comments on: Identifying and addressing cyber-related vulnerabilities. What cyber-dependent systems, commonly used in the maritime industry, could lead or contribute to a TSI if exploited by an adversary? Are there existing cybersecurity assurance programs in use by industry that the USCG could recognize? How can vessel and facility operators reliably demonstrate that critical cyber-systems meet appropriate technical or procedural standards? Do classification societies, protection and indemnity clubs, or insurers recognize cybersecurity best practices that could help the maritime industry and the USCG address cybersecurity risks?

20 20 Coverage for Cyber Risks Cyber Risk Policies Limited cyber-risk insurance policies provide coverage for first party property and limited third party claims with relatively low limits. Coverages: Forensic analysis, remediation of data systems, notification to customers, public affairs/public relations and notification to third parties. Loss of intellectual property, financial information, and proprietary data of the insured. London market coverages have provided some property damage and business interruption coverages.

21 21 Coverage for Cyber Risks Property Insurance Provides coverage for company s physical assets and business interruption/contingent business interruption. Often EXCLUDES losses resulting from cyber risks/cyber attacks. US Courts are divided regarding whether damage to software/computer systems are physical damage to tangible property. Am. Guarantee & Liab. Ins. Co. v. Ingram Micro, Inc., No. CIV TUC ACM, 2000 WL (D. Ariz. 2000) (Corruption of electronic data was physical damage to tangible property). Lambrecht & Assocs., Inc. v. State Farm Lloyds, 119 S.W.3d 16 (Tex. App. Tyler 2003, no pet.) (Damage to data is loss of tangible property). Ward Gen. Ins. Servs., Inc. v. Emp rs Fire Ins. Co., 7 Cal. Rptr. 3d 844 (Cal. Ct. App. 2004) (Loss suffered by plaintiff was a loss of information. Plaintiff did not lose the tangible material of the storage medium).

22 22 Coverage for Cyber Risks D&O Policies Provide some coverage to corporate management and the entity for securities claims related to alleged failures to mitigate cyber risks. Many D&O policies have exclusions for cyber risks. Most D&O policies will NOT provide coverage for property damage, environmental impairment or business interruption. Many D&O policies do not cover officer and director liability for failure to provide/purchase adequate insurance.

23 23 Coverage for Cyber Risks Commercial General Liability Insurance (CGL) Property Damage Coverage A Is damage to electronic data property damage? Magnetic Data, Inc. v. St. Paul Fire & Marine Ins. Co., 442 N.W.2d 153 (Minn. 1989) electronic data erased from hard drive was intangible and not covered under property damage definition. After 2001, many policies exempted electronic data from property damage definition. After 2004, ISO wording excluded [d]amages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data. Electronic Data Liability Endorsement reintroduced electronic data into the definition of property damage.

24 24 Coverage for Cyber Risks Commercial General Liability Insurance (CGL) Personal and Advertising Injury Liability Coverage B Personal and advertising injury includes: Oral or written publication, in any manner, of material that violates a person s right of privacy. Coverage for loss of personally identifiable information (PII). Zurich Am. Ins. v. Sony Corp., No (N.Y. Sup. Ct. Feb. 24, 2014). Coverage B of the CGL policy applied to publication of Sony customers confidential information. Because the disclosures were made by the hackers, and not Sony, insurer had no duty to defend insured or pay damages. Netscape Commc ns Corp. v. Fed. Ins. Co., 343 Fed. App x 271 (9th Cir. 2009). SmartDownload software collected claimants internet usage and used information for advertising. Court found claims within personal injury coverage and ruled insurer had duty to defend insured. Court did not require a disclosure of PII to a third party.

25 25 Cyber Risk Exclusions ISO 2004 Electronic Data Exclusion. ISO 2014 Data Breach Exclusions. CL 380 Cyber Risk Exclusion. NMA2914 & NMA2915 Exclusions. AIMU?

26 26 Cyber Risk Exclusions Ambiguity? Judicial Treatment of Insurance Policies Courts construe insurance policies according to general rules of contract construction to ascertain the parties intent. They examine the entire agreement and seek to harmonize and give effect to all provisions so that none are meaningless. Gilbert Tex. Constr., L.P. v. Underwriters at Lloyd s London, 327 S.W.3d 118, 126 (Tex. 2010). Ambiguity in exclusions: The court must adopt the construction of an exclusionary clause urged by the insured as long as that construction is not unreasonable, even if the construction urged by the insurer appears to be more reasonable or a more accurate reflection of the parties' intent. Nat l Union Fire Ins. Co. of Pittsburgh, Pa. v. Hudson Energy Co., 811 S.W.2d 552, 555 (Tex. 1991).

27 ISO 2004 Electronic Data Exclusion and Definition 27 CG (2004 CGL Form) 2. Exclusions This insurance does not apply to: p. Electronic Data (2) Damages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate "electronic data" that does not result from physical injury to tangible property.... However, this exclusion does not apply to liability for damages because of "bodily injury."

28 ISO 2004 Electronic Data Exclusion and Definition (continued) 2004 Revised Definition of Property Damage 28 For the purposes of this insurance, electronic data is not tangible property. As used in this definition, electronic data means information, facts or programs stored as or on, created or used on, or transmitted to or from computer software, including systems and applications software, hard or floppy disks, CO-ROMS, tapes, drives, cells, data processing devices or any other media which are used with electronically controlled equipment.

29 ISO 2004 Electronic Data Exclusion and Definition (continued) 29 CG (2004 CGL Form) Exclusion of damages arising out of the: Loss of use of electronic data ; Corruption of electronic data ; Inability to manipulate electronic data ; and Does not result from the physical injury to tangible property. Definition of electronic data includes: Information; Programs; Used on or transmitted from computer software, including systems applications software, or any other media which are used with electronically controlled equipment.

30 ISO 2004 Electronic Data Exclusion and Definition (continued) No mention of virus or malicious use of electronic data. 30 Low level of ambiguity/broad level of applicability.

31 ISO Data Breach Exclusions Effective 1 May Various formats and applications: Liability (CGL) Coverage A & B. Property. Umbrella. Excess.

32 32 ISO Data Breach Exclusions CG A. Exclusion 2.p. of Coverage A Bodily Injury And Property Damage Liability in Section I Coverages is replaced by the following: 2. Exclusions This insurance does not apply to: p. Electronic Data Access Or Disclosure Of Confidential Or Personal Information And Data-related Liability Damages arising out of:

33 33 ISO Data Breach Exclusions (continued) (1) Any access to or disclosure of any person's or organization's confidential or personal information, including patents, trade secrets, processing methods, customer lists, financial information, credit card information, health information or any other type of nonpublic information; or (2) Damages arising out of tthe loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate "electronic data" that does not result from physical injury to tangible property.... However, unless Paragraph (1) above applies, this exclusion does not apply to liability for damages because of "bodily injury".

34 34 ISO Data Breach Exclusions CG New heading Access Or Disclosure Of Confidential Or Personal Information And Data-Related Liability. Introduces issue of ambiguity concerning the contextual interpretation of exclusion. Intended application data breach or physical damage caused by cyber risk? New damages wording Patents, trade secrets, customer lists, financial information, credit card information. Introduces issue of ambiguity concerning exclusion of damages that do not necessarily arise from disclosure or publication of confidential, proprietary, financial information PII.

35 35 ISO Data Breach Exclusions (continued) Intent and focus of 2014 exclusions is on damages resulting from data breach/disclosure, not property damage, pollution, redrill/replacement, environmental remediation, bodily injury or death. Insurer has the burden of proving the application of an exclusion.

36 36 CL380 Exclusion INSTITUTE CYBER ATTACK EXCLUSION CLAUSE 1.1 Subject only to clause 1.2 below, in no case shall this insurance cover loss damage liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software program, malicious code, computer virus or process or any other electronic system. 1.2 Where this clause is endorsed on policies covering risks of war, civil war, revolution, rebellion, insurrection, or civil strife arising therefrom, or any hostile act by or against a belligerent power, or terrorism or any person acting from a political motive, Clause 1.1 shall not operate to exclude losses (which would otherwise be covered) arising from the use of any computer, computer system or computer software program or any other electronic system in the launch and/or guidance system and/or firing mechanism of any weapon or missile. 10/11/03 CL380

37 37 CL380 Exclusion As a means for inflicting harm When and by whom is this determined? o In U.S. courts causation and/or intent is most often determined by the trier of fact jury or judge. o Under a liability policy, a duty to defend is often triggered by the claim wording and the policy wording 8 Corners Rule. o Usually, extrinsic evidence is not considered in determining if an insurer has a duty to defend.

38 38 CL380 Exclusion (continued) Insurer has the burden of proving the application of an exclusion. What if there is no finding that virus/code was sent for the purpose of inflicting harm?

39 39 CL380 Exclusion Malice is determined by trier of fact. Clear and convincing evidence. Higher standard than preponderance of evidence. Under a liability policy, the insurer s duty to defend may be determined before a finding or admission of malice. Contra proferentem favoring the insured. Webopedia, Wikipedia and Symantec provide references to malicious code that are broader than legally focused interpretation.

40 40 NMA 2914/NMA2915 Exclusions 1. Electronic Data Exclusion ELECTRONIC DATA Notwithstanding any provision to the contrary within the Policy or any endorsement thereto, it is understood and agreed as follows: a. This policy does not insure loss, damage, destruction, distortion, erasure, corruption or alteration of ELECTRONIC DATA from any cause whatsoever (including but not limited to COMPUTER VIRUS) or loss of use, reduction in functionality, cost, expense of whatsoever nature resulting therefrom, regardless of any other cause or event contributing concurrently or in any other sequence to the loss. * * *

41 41 NMA 2914/NMA2915 Exclusions (continued) b. However, in the event that a peril listed below results from any of the matters described in paragraph (a) above, this policy, subject to all of its terms, conditions and exclusions, will cover physical damage occurring during the policy period to property insured by this policy directly caused by such listed peril. Listed Perils Fire Explosion

42 42 What about ISO Conditional Exclusion of Terrorism? When is a cyber attack an act of terrorism? ISO CG Conditional Exclusion of Terrorism Relating to Disposition of Federal Terrorism Risk Insurance Act (TRIA)? Excludes coverage for any injury or damage caused by terrorism o Terrorism = commission or threat of an act that interferes with or disrupts an electronic communications, information or mechanical system.

43 43 What about ISO Conditional Exclusion of Terrorism? (continued) If one or more of following elements are involved in the act of terrorism o Radioactive, pathogenic, biological, poisonous or chemical materials. o Total insured property damages exceeds $25 million. o Bodily injury or death involving 50 or more persons.

44 Insurance Coverage for Cyber Risks in the Marine Sector - Path Forward Good(?) News 44 U.S. government is considering use of regulations, commercial, financial and legal incentives to: Encourage companies to implement measures to prevent cyber attacks. Encourage the creation of insurance programs to respond to cyber attacks. Asking for input from insurers.

45 Insurance Coverage for Cyber Risks in the Marine Sector - Path Forward Good(?) News (continued) Many marine and energy companies have sophisticated safeguards/systems to prevent cyber attacks. The marine and energy sector and the global insurance market have worked closely for years on conceptually challenging risks. 45 Existing risk assessment templates can be used to assess cyber risks/cyber attacks, require appropriate safeguards and provide reasonable coverage.

46 Insurance Coverage for Cyber Risks in the Marine Sector - Path Forward Bad(?) News 46 Insurance coverage for marine sector cyber attacks is still a nascent risk market. Unlike some other risks, cyber attacks continue to evolve at a rapid pace. Conceptually challenging risk scenarios and damage models involving multiple types of coverages and underwriting disciplines. Affordability of insurance products? Initial cybersecurity regulations may be undesirable if insureds and insurers do not engage in regulatory commenting process.

47 47 Special thanks to: Tony Cowie, Swiss Re Glenn Legge, Legge Farrow

48 48 Questions?

49 Contact Information Joseph G. Grasso David L. Hall

50 This presentation is a summary of legal principles. Nothing in this presentation constitutes legal advice, which can only be obtained as a result of a personal consultation with an attorney. The information published here is believed accurate at the time of publication, but is subject to change and does not purport to be a complete statement of all relevant issues.

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015 Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine

More information

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY E FACILITATION COMMITTEE 39th session Agenda item 7 FAL 39/7 10 July 2014 Original: ENGLISH ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE Measures toward enhancing maritime cybersecurity Submitted

More information

Global Energy Practice CYBER GAP INSURANCE CYBER RISK: FILLING THE COVERAGE GAP

Global Energy Practice CYBER GAP INSURANCE CYBER RISK: FILLING THE COVERAGE GAP Global Energy Practice CYBER GAP INSURANCE CYBER RISK: FILLING THE COVERAGE GAP 1 Cyber Gap Insurance CYBER RISK: A GROWING CONCERN For the last quarter of a century, the global energy sector has relied

More information

Cloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers

Cloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers Cloud Coverage Transcending the Cloud A Legal Guide to the Risk and Rewards of Cloud Computing Cloud Coverage Authors Richard P. Lewis, Partner rlewis@reedsmith.com Carolyn H. Rosenberg, Partner crosenberg@reedsmith.com

More information

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act JULY 17, 2014 2013 Venable LLP 1 Agenda 1. Security Risks affecting the Maritime Transportation System (MTS) 2. The

More information

Insurance Coverage Law Report

Insurance Coverage Law Report September 2013 Insurance Coverage Law Report From the Editor Our Industry News, and Why It Matters By Steven A. Meyerowitz Feature Articles Data Breaches and the General Liability Policy in a Cyber-World

More information

THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR

THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR Global Marine Practice JULY 2014 THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR CONTENT: 2 INTRODUCTION 2 WHY NOW? 4 WHY IS THE MARITIME SECTOR PARTICULARLY VULNERABLE? 5 THE COVERAGE GAP 6 CLOSING THE

More information

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance

More information

Cyber and CGL Insurance Coverage for Data Breach Claims

Cyber and CGL Insurance Coverage for Data Breach Claims Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance

More information

Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program?

Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program? Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program? July 2014 Lockton Companies Cyber and Privacy Liability insurance programs have grown in popularity

More information

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory

More information

Will Deepwater Horizon Change a Long Standing Rule of Law?

Will Deepwater Horizon Change a Long Standing Rule of Law? Will Deepwater Horizon Change a Long Standing Rule of Law? In re Deepwater Horizon, 710 F.3d 338 (5 th Cir. 2013, withdrawn on r hrg). r In re Deepwater Horizon, 728 F.3d 491 (5 th Cir. 2013). ACCIDENT

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem. Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

S. ll IN THE SENATE OF THE UNITED STATES A BILL

S. ll IN THE SENATE OF THE UNITED STATES A BILL TH CONGRESS ST SESSION S. ll To codify mechanisms for enabling cybersecurity threat indicator sharing between private and government entities, as well as among private entities, to better protect information

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

WAR, MILITARY ACTION AND TERRORISM EXCLUSION

WAR, MILITARY ACTION AND TERRORISM EXCLUSION COMMERCIAL AUTO CA 23 37 01 02 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EXCLUSION This endsement modifies insurance provided under the following: BUSINESS AUTO COVERAGE FORM BUSINESS

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

PRIORITY. Professional Indemnity Insurance Contract

PRIORITY. Professional Indemnity Insurance Contract PRIORITY Professional Indemnity Insurance Contract Between AC&E PI and Liability Underwriters (Pty) Ltd acting as underwriting managers on behalf of the New National Assurance Company Ltd and hereafter

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Insurance Coverage for Cyber Attacks

Insurance Coverage for Cyber Attacks May 2013 The text of this article first appeared in the May 2013 issue of The Insurance Coverage Law Bulletin, Vol. 12, No. 4 Insurance Coverage for Cyber Attacks Part One of a Two-Part Article By Roberta

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

What is Cyber Liability

What is Cyber Liability What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Policy Wording. Directors and Officers Liability and Company Reimbursement. Issued to Eligible Emergency Resource Providers by VMIA

Policy Wording. Directors and Officers Liability and Company Reimbursement. Issued to Eligible Emergency Resource Providers by VMIA Policy Wording Directors and Officers Liability and Company Reimbursement Issued to Eligible Emergency Resource Providers by VMIA For the period date 30 June 2014 to 30 June 2015 Contents Directors and

More information

INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013

INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presenters: Roberta D. Anderson John P. Scordo INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presentation to the Association of Corporate Counsel Western Pennsylvania Chapter Copyright

More information

CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER

CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER Stephen D. Rosenberg, Esq. John H. Lacey, Esq. THE MCCORMACK FIRM, LLC Boston, Massachusetts CURRENT TRENDS IN DATA PROTECTION (or lack thereof) 2011 Year

More information

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage 2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and

More information

Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION ORDER

Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION ORDER Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION CHARTIS SPECIALTY INSURANCE CO., Plaintiff, v. CIVIL ACTION

More information

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT Case: 13-20512 Document: 00512673150 Page: 1 Date Filed: 06/23/2014 IN THE UNITED STATES COURT OF APPEALS United States Court of Appeals FOR THE FIFTH CIRCUIT Fifth Circuit FILED June 23, 2014 Lyle W.

More information

6 Commercial General Liability Insurance

6 Commercial General Liability Insurance 6 Commercial General Liability Insurance I. Overview 6.1 Mark D. Willmarth Deborah A. Hebert II. What Is a CGL Policy? A. Scope of a CGL Policy 6.2 B. Parts of a CGL Policy 6.3 III. The CGL Insuring Agreements

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128

More information

DIVISION N CYBERSECURITY ACT OF 2015

DIVISION N CYBERSECURITY ACT OF 2015 H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table

More information

S. 2519 AN ACT. To codify an existing operations center for cybersecurity.

S. 2519 AN ACT. To codify an existing operations center for cybersecurity. TH CONGRESS D SESSION S. 1 AN ACT To codify an existing operations center for cybersecurity. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference

More information

ISO's Newly-Filed Data Breach Exclusions Provide Yet Another Reason To Consider "Cyber" Insurance

ISO's Newly-Filed Data Breach Exclusions Provide Yet Another Reason To Consider Cyber Insurance September 26, 2013 The text of this article was first published by Law360 on September 23, 2013. ISO's Newly-Filed Data Breach Exclusions Provide Yet Another Reason To Consider "Cyber" Insurance By Roberta

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the technology and telecommunications

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

CYBERSECURITY RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS

More information

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary

More information

CGL 101 - Understanding Commercial General Liability Policy

CGL 101 - Understanding Commercial General Liability Policy Proudly presents CGL 101 - Understanding Commercial General Liability Policy Maurice Audet, Senior Vice President Aon Reed Stenhouse Inc. maurice.audet@aon.ca Tom Ozere, Partner Borden Ladner Gervais LLP

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 2519 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun held at the City of Washington on Friday, the third day of January, two thous fourteen An Act To codify

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,

More information

(1) Commercial Crime Insurance or Employee Fidelity Bond

(1) Commercial Crime Insurance or Employee Fidelity Bond INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance

More information

COVERAGE UNDER A CGL POLICY. A. CGL coverage is Commercial General Liability Coverage.

COVERAGE UNDER A CGL POLICY. A. CGL coverage is Commercial General Liability Coverage. COVERAGE UNDER A CGL POLICY I. Type of coverage provided by CGL coverage. A. CGL coverage is Commercial General Liability Coverage. B. Generally, a CGL policy provides coverage for the insured s liability

More information

Nuclear Security Requires Cyber Security

Nuclear Security Requires Cyber Security Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027

More information

PRODUCT LIABILITY INSURANCE (Richard Oliver Version)

PRODUCT LIABILITY INSURANCE (Richard Oliver Version) (Richard Oliver Version) OPERATIVE CLAUSE The Underwriters will indemnify the Assured against their legal liability, whether by way of claims made against them or by way of loss or expense incurred by

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

Implementation of the Cybersecurity Executive Order

Implementation of the Cybersecurity Executive Order Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group

More information

LIGC-ACC Presentation November 9, 2015

LIGC-ACC Presentation November 9, 2015 Bryan Frank, DDIS Info Sec Corp, panelist Jennifer M. Mone, Deputy General Counsel, Hofstra University, panelist Keith J. Frank, Partner, Forchelli, Curto, Deegan, Schwartz, Mineo & Terrana,. LLP, moderator

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton

More information

In The Court of Appeals Fifth District of Texas at Dallas. No. 05-12-00658-CV

In The Court of Appeals Fifth District of Texas at Dallas. No. 05-12-00658-CV Reverse and Remand; Opinion Filed November 19, 2013. S In The Court of Appeals Fifth District of Texas at Dallas No. 05-12-00658-CV INNOVATE TECHNOLOGY SOLUTIONS, L.P., Appellant V. YOUNGSOFT, INC., Appellee

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

How Secure is Your SCADA System?

How Secure is Your SCADA System? How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential

More information

Hole In One Policy Wording

Hole In One Policy Wording Hole In One Policy Wording V03.14 Pen Underwriting Pty Ltd ABN 89 113 929 516 AFSL 290518 Our name comes from the expression to pass the pen. It reflects what we do and what we bring to the insurance industry

More information

Changing Legal Landscape in Cybersecurity: Implications for Business

Changing Legal Landscape in Cybersecurity: Implications for Business Changing Legal Landscape in Cybersecurity: Implications for Business Presented to Greater Wilmington Cyber Security Group Presented by William R. Denny, Potter Anderson & Corroon LLP May 8, 2014 Topics

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Beyond Data Breach: Cyber Trends and Exposures

Beyond Data Breach: Cyber Trends and Exposures Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

Can Cyber Insurance Be Linked to Assurance?

Can Cyber Insurance Be Linked to Assurance? SESSION ID: CXO-W03 Can Cyber Insurance Be Linked to Assurance? Larry Clinton President and CEO Internet Security Alliance @ISalliance Dan Reddy Adjunct Faculty: Engineering & Technology Quinsigamond Community

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

DIVISION N CYBERSECURITY ACT OF 2015

DIVISION N CYBERSECURITY ACT OF 2015 U:\0REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR0-AMNT.xml DIVISION N CYBERSECURITY ACT OF 0 SEC.. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 0.

More information

Five Steps To Data Breach Coverage For Card Issuer Liability

Five Steps To Data Breach Coverage For Card Issuer Liability 20 April 2015 Practice Groups: Insurance Coverage Cyber Law and Cybersecurity This article was first published by Law360 on April 17, 2015. Five Steps To Data Breach Coverage For Card Issuer By Roberta

More information

IRONSHORE INSURANCE SERVICES LLC

IRONSHORE INSURANCE SERVICES LLC IRONSHORE INSURANCE SERVICES LLC ONE STATE STREET, 7 TH FLOOR, NEW YORK, NY 10004 ADMINISTRATOR FOR PEMBROKE MANAGING AGENCY - LLOYD S Syndicate 4000 UMR# B6081NB000441A GENERAL SPECIE INSURANCE POLICY

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

Deductible Buy-Down Insurance Wording 2015

Deductible Buy-Down Insurance Wording 2015 Deductible Buy-Down Insurance Wording 2015 Indemnity The Insurer agrees to indemnify the Insured named in Item 1 of the Schedule in respect of direct physical loss or damage to the property described in

More information

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond

More information

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Guidance on Risk Analysis Requirements under the HIPAA Security Rule Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT The parties to this ( Agreement ) are, a _New York_ corporation ( Business Associate ) and ( Client ) you, as a user of our on-line health record system (the "System"). BY

More information

PHP POINT OF SALE TERMS OF USE

PHP POINT OF SALE TERMS OF USE PHP POINT OF SALE TERMS OF USE This Terms of Use Agreement (the Agreement ) states the terms and conditions that govern the contractual agreement between PHP Point of Sale, LLC, (the Company ) and you

More information

Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. In The Court of Appeals Fifth District of Texas at Dallas

Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. In The Court of Appeals Fifth District of Texas at Dallas Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. S In The Court of Appeals Fifth District of Texas at Dallas No. 05-13-01546-CV OKLAHOMA SURETY COMPANY, Appellant/Cross-Appellee

More information