What an HIE needs to know about insurance and cyber coverage Arturo Perez-Reyes Senior Vice President, Executive Liability Practice

Size: px
Start display at page:

Download "What an HIE needs to know about insurance and cyber coverage Arturo Perez-Reyes Senior Vice President, Executive Liability Practice"

Transcription

1 What an HIE needs to know about insurance and cyber coverage Arturo Perez-Reyes Senior Vice President, Executive Liability Practice 1

2 Key concepts History Phoenicians Lloyds Franklin Indemnity Insurance is not a speculative risk It depends on large numbers It produces a social good Contracts Policies are contracts of good faith They are contracts of adhesion Ambiguities favor insureds Regulation Controlled by states But a Federal responsibility 2

3 Insurance lines common to all firms General liability covers liabilities form bodily injury and property damage; advertising and personal injuries; and has sub-limits for medical expense Auto for non-owned and hired liabilities covers a firm in case it is named when an employee drives or rents; can cover property damage Workers compensation exclusive remedy for workplace injuries by employees Employers liability covers the same kind of claim brought by workers who refuse the statutory benefits Property covers first-party losses of tangible property caused by insured perils Business interruption covers loss of income or extra expense caused by same Umbrella raises the limits on several liability lines and can add extra coverage Excess raises the limits on one liability line 3

4 Lines common to many firms Directors and officers (aka Management liability) covers allegations of wrongful acts by officers and board members Employment-practices liability covers allegations of discrimination, harassment, or termination Fiduciary liability cover liabilities that stem from retirement plans like 401K Crime (aka Fidelity) covers embezzlement, unauthorized transfer, computer fraud, theft, or robbery E&O or professional liability covers wrongful acts when delivering services; often has privacy, media, interruption Privacy covers loss of private or confidential information (found in E&O forms) 4

5 Lines for specialized needs Cargo covers the movement of goods while in transit Trade-credit protects accounts receivable from non payment Political risk protects against expropriation or wars Kidnap and ransom protects and sequestration and hostage taking Pollution covers liabilities from discharge of toxins Product recall a first-party coverage that removes dangerous products Builders risk covers the property of all parties at building sites Warranties backs product or service promises made to consumers Bonds not insurance, but a type of credit instrument; backs contracts Travel Risk Management (TRM) 5

6 Key Vocabulary Limits: per claim vs in the aggregate Deductible vs self-insured retention Occurrence vs claims-made forms First-party vs third party coverage London vs US placements Sharing risk with layers vs quota share Packages vs monoline placements Blankets vs scheduled coverage Admitted vs non-admitted insurers Tails or extended-reporting periods Contract exclusions vs insured contracts Named insured vs additional insured Notice to additional insureds Not adding yourself to PL as an AI 6

7 Do traditional lines provide coverage? General Liability Excludes employee-related claims Excludes professional-service related claims Excludes IP infringement save in advertising Professional Liability Often excludes privacy, security, and media Does not cover costs of breach notifications, credit monitoring, and identity remediation Excludes regulatory defense, actions, fines, and penalties Courts have found that business and IT systems are not professional

8 Privacy policy triggers LIABILITY--The trigger for this coverage is a lawsuit alleging a breach of privacy or confidentiality, a tort alleging an information-security injury, or an infringement of multimedia. REGULATORY The trigger for this coverage is a governmental action by a privacy regulator. The policy pays defense as well as fines and awards. PRIVACY EXPENSES The trigger for this coverage is a potential breach of a privacy statute. It pays for forensic analysis as well as victim notification credit monitoring, and support services. OTHER EXPENSES The trigger are three: an extortion threat as well as a logical attack that destroys data or causes network-interruption that impacts profits. OTHER FINES The trigger is a written demand from a credit-card association for a monetary fine or penalty because of your noncompliance with PCI-DSS.

9 Loss scenarios INSURER ESTIMATES SCENARIO 1 SCENARIO 2 SCENARIO 2 ASSUMPTIONS individuals breached 100,000 1,000,000 10,000,000 Type of data PHI PHI PHI Monitoring years Brand recognition Yes Yes Yes LEGAL AND REGULATORY Defense and damages $300,000 $6,000,000 $60,000,000 Regulatory fines and penalties $1,500,000 $1,500,000 $1,500,000 PCI assessments and card re-issue $0 $0 $0 SUBTOTAL $1,800,000 $7,500,000 $61,500,000 BREACH RESPONSE Public relations $39,000 $156,000 $195,000 Notification $100,000 $800,000 $6,000,000 Credit monitoring $178,231 $1,782,312 $17,823,120 ID restoration $15,914 $159,135 $1,591,350 Call center $26,000 $206,000 $2,006,000 SUBTOTAL $359,145 $3,103,447 $27,615,470 INVESTIGATION Forensics $45,000 $270,000 $2,520,000 Legal guidance $25,000 $100,000 $300,000 SUBTOTAL $70,000 $370,000 $2,820,000 TOTAL COST $2,229,145 $10,973,447 $91,935,470 COST PER INDIVIDUAL $22.29 $10.97 $9.19

10 Sample HC structure $35,000,000 $30,000,000 $25,000,000 $20,000,000 $15,000,000 $10,000,000 $5,000,000 $0

11 Privacy and securtiy liability Covers lawsuits relating to breaches of privacy Covers employee suits Covers clients and customer suits Covers business-confidentiality suits Most forms cover confidentiality, but some not Some forms cover trade secrets, but some not Covers suits relating to information security attacks Your systems could end up hosting bot nets that make DOS attacks or host malware Your network could allow hackers to attack partners Covers suits caused by vendors breaching privacy and security Your value chain can drag you into suits

12 Electronic-media coverage Covers personal injuries via electronic media Libel Slander Disparagement Growing problem on social media SMS Twitter Facebook Google Plus Blogging Covers IP infringements via electronic media Copyright Trademark; trade dress (No patent or trade-secret infringement) Also growing problem Image infringement via websites, Flickr, Pinterest Plagiarism via and white papers Trademark violations via PowerPoint

13 Regulatory defense and fines Defense against regulators can take years TJX did not finish with investigations and fines for three years Federal regulators include FTC, HHS, OCR, and various banking regulators Europe is stricter; safe harbors are shrinking Fifty seven states have privacy reporting statutes; MA is severe California led and has 81different privacy laws Attorneys general have been active and can enforce HIPAA Several industry groups also fine; e.g. PCI penalties are common and expensive

14 Example: Federal privacy fines In 2014, New York-Presbyterian Hospital and Columbia University agreed to pay $4.8 million for breaching 6,800 individuals (5/14). Also HHS imposed a $150,000 fine for an unencrypted USB drive (1/14). In 2013, OCR issued 6 resolutions. Penalties ranged up to $1.7M for Wellpoint (7/13). Corrective actions range from 60 days to two years. In 2012, Google paid $22.5 million to settle FTC charges about tracking cookies (8/12). The MA Eye & Ear Infirmary agreed to pay $1.5 million for an unencrypted laptop (9/12) In 2011, MA General Hospital settled for $1 million and a 3-year corrective plan (2/11). Cignet Health paid a $4.3 million penalty for refusing patients access to medical records (2/11). UCLA Health System paid a $865,000 settlement and received a 3-year corrective plan for allowing unauthorized access to PHI. (7/11) February 26, 2015 Change footer 14

15 Example: 2013 fines in California All fines at

16 Breach-expense coverage Policy is triggered by breach of a statute Covers paper, phone, and electronic media Global in territory, because of Internet Policy forms vary Better forms have next to no sub limits Some forms provide dollars; others number of victims Some forms require permission; others not Forensic analysis Infosec assistance Crisis management PR and legal coaching Victim notification Mail and 24/7 phone Credit monitoring One year Identity remediation Only better forms pay

17 Interruption and extortion Interruption trigger is loss of revenue; calculation can be forensic or agreed value Pays net profits during the period of interruption Extortion trigger is a threat or demand Pays for security consultation Can pay the extortion demand Has a waiting period of hours that can be bought down Policy also pays extra expense during the period of interruption

18 ARTURO PEREZ-REYES Overview--Arturo Perez-Reyes has worked for 14 years as a risk consultant and broker for Marsh, Barney and Barney, and now Hub International. He helps companies identify, quantify, and insure liability and property risks from technology, services, value chains, intellectual property, privacy, security, and compliance. Technology and privacy insurance-- He has placed technology errors-and-omissions, professional liability, and privacy insurance for complex and large clients. He helped develop the first privacy policies and recently produced hybrid products that provide both insurance and information-security services domestically and in London. On E&O placements, he manuscripts coverage to adjust for exposures, gaps, and overlaps. He has placed coverage for industries such as retail, financial institutions, law firms, healthcare organizations, travel-hospitality, utilities, manufacturers, telecom, gambling, pharmaceutics, manufacturing, web-services, and technology. Enterprise risk management--he has also done enterprise-risk consulting for mid-cap to Fortune 50 companies. The studies have identified, quantified, and mitigated liabilities and losses from data losses, privacy violations, confidentiality torts, intellectual-property invalidation and litigation as well as from new technologies, emerging services, IT value chains, information sharing, and regulatory compliance. His clients have included Google, Yahoo, Intel, Sun, HP, Cisco, Adobe, Symantec, Verisign, Oracle, ESET, Epicor, Stanford, UCSF, UCB, Adventist Health, Erickson, IGT, CUNA Mutual, Bloomberg, etc. In addition, he has consulted in the UK, and EU on technology risk, service liabilities, business interruption, and professional liability. He has expertise in financial institutions, web services, software, telecos, retail, gaming, education, healthcare, and technology. He has presented nationally and internationally at industry

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014 CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

Insurance Solutions for Health Care Organizations

Insurance Solutions for Health Care Organizations Insurance Solutions for Health Care Organizations Is your organization at risk? A health care organization s complex exposures require expert, state-of-the-art insurance protection. Fortunately, Chubb

More information

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial

More information

(1) Commercial Crime Insurance or Employee Fidelity Bond

(1) Commercial Crime Insurance or Employee Fidelity Bond INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance

More information

Cyber Risk State of the Art

Cyber Risk State of the Art Proudly presents Cyber Risk State of the Art Matthew Davies, Chubb Insurance Catherine Dowdall, Canada Post Mike Petersen, Marsh 1 Agenda 1. Who is At Risk? 2. New/Emerging Risk and Trends 3. Canada Post

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1

NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 2 June 10,

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

How To Insure An Investment Advisor

How To Insure An Investment Advisor SPOTLIGHT ON Insurance and Bonding Considerations for Registered Investment Advisors The contents of this Spotlight have been prepared for informational purposes only, and should not be construed as legal

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

How To Insure A Car In The United States

How To Insure A Car In The United States Save As UCIP COVERAGE SUMMARY EXHIBIT 1A THE REGENTS OF THE UNIVERSITY OF CALIFORNIA UNIVERSITY CONTROLLED INSURANCE PROGRAM (UCIP) This Exhibit summarizes the UCIP Commercial General Liability, Workers

More information

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance

More information

Specialty Risk Protector

Specialty Risk Protector Specialty Professional Liability and Data and Network Security Insurance is a single policy that makes it easy for companies to secure the multi-faceted E&O protection our networked world requires. A simplified,

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

CYBER LIABILITY INSURANCE

CYBER LIABILITY INSURANCE CYBER LIABILITY INSURANCE CONTINUING EDUCATION CLASS MARCH 6, 2013 PRESENTED BY COUSINO HARRIS STEWART V. NELSON, Senior Risk Advisor Stewart.Nelson@Kapnick.com 734 929 6057 Class Objectives Understand

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Cyber-Technology Policy Comparisons

Cyber-Technology Policy Comparisons Cyber-Technology Policy Comparisons ABA Insurance Internet/Electronic Banking Liability Insurance Policy (04/01) January, 2011 Endorsements Topic ACE Computer & Technology Products and Services Professional

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage

More information

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President

More information

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance

More information

Insurance basics for nonprofit organizations

Insurance basics for nonprofit organizations Insurance basics for nonprofit organizations Updated: July 2012 This document is intended as general and abbreviated guidance for nonprofit organizations. Because every organization s insurance needs are

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

The Hedge Fund & Investment Advisor s Guide to. D&O / E&O Insurance

The Hedge Fund & Investment Advisor s Guide to. D&O / E&O Insurance The Hedge Fund & Investment Advisor s Guide to D&O / E&O Insurance Financial services companies require a special expertise in insurance product design and placement. Hedge Funds & Investment Advisors

More information

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

Our specialist insurance services for Professionals risks

Our specialist insurance services for Professionals risks Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international

More information

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance By Shawn Tuma & Katti Smith Data breaches have become far more common than most people realize.

More information

Zurich Public Sector Solution

Zurich Public Sector Solution Zurich Public Sector Solution Solutions for an Evolving Public Sector Managing risk for a Public Sector entity has taken on an unprecedented level of complexity. Consider for a moment the evolving risks

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a

More information

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,

More information

Introduction to Directors and Offi cers Liability Insurance

Introduction to Directors and Offi cers Liability Insurance CHAPTER 1 Martin J. O Leary Introduction to Directors and Offi cers Liability Insurance The following is a brief, general overview of coverage afforded under the Directors and Officers Liability Insurance

More information

How To Buy Cyber Insurance

How To Buy Cyber Insurance 10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Fiduciary Insurance and the Board of Retirement in New York State

Fiduciary Insurance and the Board of Retirement in New York State ORANGE COUNTY EMPLOYEES RETIREMENT SYSTEM MEMORANDUM DATE: October 7, 2015 TO: FROM: SUBJECT: Members of the Board of Retirement Robert Valer, Chief Legal Officer Fiduciary Insurance Recommendation: Receive

More information

Overview of Insurance

Overview of Insurance Overview of Insurance Definitions and Terms Client/Agent Relationship Agent A person or organization who/that is authorized to act on behalf of another. An insurance agent is a person or organization who/that

More information

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements July 14, 2015 Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Program Overview 1. How to Transfer Risk and

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection

More information

Insurance implications for Cyber Threats

Insurance implications for Cyber Threats Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of

More information

RISK MANAGEMENT 101 WEBCAST SERIES

RISK MANAGEMENT 101 WEBCAST SERIES RISK MANAGEMENT 101 WEBCAST SERIES BASICS OF CASUALTY INSURANCE March 19, 2014 BASICS OF CASUALTY INSURANCE INTRODUCTIONS STEVE KERR Managing Director ROBERT GARCIA Senior Vice President BRIAN COYLE Senior

More information

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach

More information

Commercial Lines Exposure Checklist For:

Commercial Lines Exposure Checklist For: Commercial Lines Exposure Checklist For: Client Name Date Coverage Has Coverage Need Coverage Not Applicable/ Miscellaneous Policices Aircraft Products Liability Aviation Bonds Breach of Privacy Credit

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Cyber Insurance Presentation

Cyber Insurance Presentation Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance

More information

Data security: A growing liability threat

Data security: A growing liability threat Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars

More information

General Liability. General Liability 4/30/2015. Liability Coverage in the RIM Industry

General Liability. General Liability 4/30/2015. Liability Coverage in the RIM Industry 2015 Annual Meeting May 19, 2015 Liability Coverage in the RIM Industry Presented By Brian Jungeberg, CIC General Liability Protects You From Claims of Bodily Injury or Property Damage Claims Examples

More information

TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith

TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith Types of Data at Stake Residents, constituents, employees PII Personally Identifiable

More information

As with most things, insurance should be

As with most things, insurance should be Insurance Buyers News Property & Liability 300 Montgomery Street Suite 450 San Francisco, CA 94104 415-820-2200 www.pennbrookinsurance.com Insurance Buyers News March/April 2012 Volume 23 Number 2 Data

More information

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Policy Considerations for Covering Special Exposures Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Special exposures Coverage that targets a loss with

More information

The Solution for General Partnership Liability Coverage Part

The Solution for General Partnership Liability Coverage Part The Solution for General Partnership Liability Coverage Part In consideration of the payment of the premium and subject to the General Terms and Conditions, the Insurer and the Insureds agree as follows:

More information

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Your Exam Content Outline

Your Exam Content Outline Your Exam Content Outline The following outline describes the content of one of the Wisconsin insurance examinations. The outlines are the basis of the examinations. The examination will contain questions

More information

Understanding. your Cyber Liability coverage

Understanding. your Cyber Liability coverage Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658

More information

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cyber Risk Insurance for Agents. Frequently Asked Questions Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship

More information

126 Questions to Ask Your Insurance Agent

126 Questions to Ask Your Insurance Agent 126 Questions to Ask Your Insurance Agent Plus One to Ask Yourself Scott Simmonds, CPCU, ARM Insurance Consulting 207-284-0085 Scott@ScottSimmonds.com www.scottsimmonds.com Insurance from an Unbiased Point

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

LMCIT Service Contract Insurance Recommendations

LMCIT Service Contract Insurance Recommendations LMCIT Service Contract Insurance Recommendations The type and amount of insurance should be determined on a case-by case basis dependent upon various factors such as the scope of work and the potential

More information

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider 1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner

More information

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

Michael Gaudet 2015 PHC 7/23/2015. Key Broker Challenges

Michael Gaudet 2015 PHC 7/23/2015. Key Broker Challenges Cyber 2015: The Market, Choosing Coverages and AEGIS Update Broker s Perspective Michael Gaudet Marsh FINPRO Energy, Power & Utility Industry Leader Marsh USA, Inc. Key Broker Challenges Coverage consistency

More information

ASSOCIATION LIABILITY Broker Information. innovative insurance protection

ASSOCIATION LIABILITY Broker Information. innovative insurance protection ASSOCIATION LIABILITY Broker Information innovative insurance protection BROKER HIGHLIGHTS We Know Non-Profits: Through our strong links with the social service and community sector Rosser Underwriting

More information

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data

More information

Insurance Basics 101: Demystifying Your Insurance Program. RLI Design Professionals Design Professionals Learning Event DPLE 165 December 16, 2015

Insurance Basics 101: Demystifying Your Insurance Program. RLI Design Professionals Design Professionals Learning Event DPLE 165 December 16, 2015 Insurance Basics 101: Demystifying Your Insurance Program RLI Design Professionals Design Professionals Learning Event DPLE 165 December 16, 2015 RLI Design Professionals is a Registered Provider with

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

PUBLIC ENTITY POLICY LAW ENFORCEMENT LIABILITY COVERAGE FORM OCCURRENCE COVERAGE

PUBLIC ENTITY POLICY LAW ENFORCEMENT LIABILITY COVERAGE FORM OCCURRENCE COVERAGE A Stock Insurance Company, herein called the Company PUBLIC ENTITY POLICY LAW ENFORCEMENT LIABILITY COVERAGE FORM OCCURRENCE COVERAGE Various provisions in this policy restrict coverage. Please read the

More information

Covenants to Insure in Commercial Agreements. In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013

Covenants to Insure in Commercial Agreements. In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013 Covenants to Insure in Commercial Agreements A Review of the CGL Policy In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013 Introduction & Overview Examples of Covenants to Insure in

More information

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem

More information

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015 Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery

More information