Cyber Liability Insurance: It May Surprise You



Similar documents
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Joe A. Ramirez Catherine Crane

Cyber and data Policy wording

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Managing Cyber & Privacy Risks

Cyber Liability. What School Districts Need to Know

How To Write A Network Security Endorsement

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Understanding the Business Risk

DATA BREACH COVERAGE

(1) Commercial Crime Insurance or Employee Fidelity Bond

Managing Cyber Risk through Insurance

Cyber and CGL Insurance Coverage for Data Breach Claims

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Insuring Innovation. CyberFirst Coverage for Technology Companies

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Service Agreement. UltraBranch Business Edition. alaskausa.org AKUSA R 05/15

Cyber-Crime Protection

Cyber-insurance: Understanding Your Risks

Enterprise PrivaProtector 9.0

Specimen. Crime Coverage Part. I. What is covered We will pay (in excess of the retention and up to the Crime Coverage Limit stated in the

Rogers Insurance Client Presentation

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Cyber Threats: Exposures and Breach Costs

Data Breach and Senior Living Communities May 29, 2015

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Attachment A. Identification of Risks/Cybersecurity Governance

Electronic Funds Transfer Agreement and Disclosures

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Business Merchant Capture Agreement. A. General Terms and Conditions

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Acceptable Use Policy

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Network Security & Privacy Landscape

ISO? ISO? ISO? LTD ISO?

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

Cyber Insurance: How to Investigate the Right Coverage for Your Company

ALTA Title Insurance & Settlement Company Best Practices

DATA PROTECTION LAWS OF THE WORLD. India

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Funds Transfer Agreement

CyberSecurity for Law Firms

The potential legal consequences of a personal data breach

Beazley presentation master

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Understanding Professional Liability Insurance

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

First State Bank, Belmond

Cyber and Data Security. Proposal form

Commercial Internet Banking Agreement and Disclosures

COVERAGE SECTION 3. FIDELITY COVERAGE

Commercial Online Banking

Chambers Bank Business Internet Banking Agreement

Cyber Insurance Presentation

Cyberinsurance: Insuring for Data Breach Risk

Risk Management of Outsourced Technology Services. November 28, 2000

INSURANCE INDUSTRY PROFESSIONAL LIABILITY COVERAGE UNIT THIS IS A CLAIMS MADE POLICY. PLEASE READ CAREFULLY.

Cyber-Technology Policy Comparisons

BUSINESS ONLINE BANKING AGREEMENT

Online Account Takeover. Roger Nettie

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

FFIEC CONSUMER GUIDANCE

Fidelity Land Title, Ltd. Title Insurance and Settlement Company Best Practices

HIPAA BUSINESS ASSOCIATE AGREEMENT

SPECIMEN. (1) advising, counseling or giving notice to employees, participants or beneficiaries with respect to any Plan;

ELECTRONIC SERVICES AGREEMENT

Data Privacy & Security: Essential Questions Every Business Must Ask

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Cybersecurity Risk Transfer

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Transcription:

Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel, Fidelity Product Leader, CNA Pro Charles Higham, VP, Diversified Financial Group - Zurich Barbara Ewing, VP, CUO, Fidelity & Mgmt. Liab. Berkley FinSecure Lisa Micciche, Product Manager, ABA Insurance Services

Regulations Affecting Banks Regulation Requirements Consequences Graham-Leach Bliley Payment Card Industry Data Security Standards (In the Works) NY Contractual Regs for Vendors Must assure the security and confidentiality of customer records and information 12 Separate security requirements in transmission and storage of data. Will place required cybersecurity regulations on vendor contracts that involve PII US attorney general action, penalties up to $100,000 for each violation, D&O liability up to $10,000 per violation. Criminal Penalties Fines up to $500,000, loss of business.???

Guidance Affecting Banks Institution/Agency Federal Financial Institutions Examination Counsel (FFIEC) FDIC FFIEC Summary Authentication systems for internet banking should be multifaceted and require something a user: a) knows, b) has, and c) is. Instituting and expanding employee training on risks of spy/malware. Dedication of software, controls and policies to prevent loss from same. Each institution is expected to monitor web traffic, have and activate response plan in the event of DDoS, and staff appropriately during attack.

Common Themes in Regulatory and Industry Guidance Guidance and Rules need to account for the Resources of the Operation. YET, critical and sensitive information needs to be given priority protection. Risk Assessments are usually the First Step. Cybersecurity protocols must be scaleable, adaptable and reviewed on a consistent basis. Crisis response plans and drilling are essential components. Employee Education and Vendor Security are critical.

Cyber/Privacy Coverage Under Errors & Omissions Network Security Privacy Injury Privacy Event Expenses Privacy Regulation Fines

Hack, Employee Negligence, Employee Theft (Rogue), Vendor Negligence/Misconduct The Perfect Storm Consumer Complaints Contract Claims Attorney Reviews, Forensics, Notice Costs, Business Interruption, Extortion DATA BREACH DATA BREACH Regulatory Investigations, Proceedings and Fines

Privacy Event Expense Reimbursement First Party Coverage for: Reasonable and necessary fees, costs and expenses in connection with a Privacy Event (failure of hardware or software designed to protect information on Insured s Network, or of business policies to prevent wrongful disclosure of third party trade secrets, NPI or NCI). Some forms impose time requirements to incur expenses.

Privacy Event Expense Reimbursement Includes forensics, attorney reviews, costs of notices, call centers and public relations firms. Usually does not include cost to remediate security (patches, new software/equipment) Expense Coverage: Two Types Voluntary (best coverage) Limited to required Security Breach Notice Laws.

Coverage for Third Party Claims Resulting from Cyber Events Forms generally cover lawsuits and demands involving a defined Privacy Injury or Network Security compromise

Coverage for Third Party Claims Resulting from Cyber Events Privacy Injury usually defined as unauthorized disclosure of Nonpublic Corporate Information or Nonpublic Personal Information. Some forms include inability to access such information as additional coverage. Network Security includes DDoS; Unauthorized Access; destruction, deletion or alteration of information on a Network; Network Interruption; Transmission of viruses

Coverage for Regulatory Actions Many forms provide coverage for Regulatory Actions from any governmental agency involving a Privacy Breach or failure to comply with Security Breach Notice Laws. Very Limited Coverage for Investigations. Forms that provide such coverage also usually provide coverage for the Fines involved in such actions, but may require a separate retention for such fines.

Electronic Theft Covers Disbursement or transfer of the Insured s Money, Securities, or Intangible Property to a person or entity not authorized to receive them. Money must exist in electronic format, and includes cash, notes, negotiable instruments and records of credit. Securities means negotiable and non-negotiable instruments, and their digital equivalents Intangible Property usually defined by Endorsement.

Extortion Covers payments necessary to protect Insured and/or pay ransom for credible threats of loss or damage to the Network, Confidential Information, Money, Securities, Intangible Property or defacement of Insured s website.

Common Exclusions Bodily Injury, although most forms provide carve back for emotional distress and mental anguish arising from a Privacy Injury. Deliberate Acts. Many forms provide carve back for Rogue Employees. Natural Catastrophe/Mechanical Breakdown Unsolicited Communications (Spam/TCPA) Power failure caused by third parties causing service interruptions. Governmental Actions (the NSA exclusion )

Case Study Miami Bank, May 2014 Discovered in May, 2014 from a review of network logs. The Bank retained 3 different forensic firms in succession. Third firm finally had the expertise to identify and deal with the issue. Trojan Horse carried through phishing attack compromised 72,500 account numbers, names, SS#s but no passwords. Required PR firm, corrective action and notification to 14 different Ags. Total Costs over 500,000, not including reputational damage.

Fidelity Bond Coverage For Cyber and Computer Related Losses Computer Crime Coverage is offered to Financial Institutions in two ways: Computer Fraud/Wire Transfer Riders added to the FI Bond Stand alone Computer Crime Policy Over-simplification of Computer Crime coverage afforded by Bonds in general: If the bond has a specified verification/authentication procedure, and that procedure is in fact followed, but the loss nonetheless occurs, then the bond pays for the loss.

Computer Systems Fraud Rider Additional Insuring Agreement for Loss resulting directly from: (1) entry of Electronic Data or Computer Program into, or (2) change of Electronic Data or Computer Program within any Computer System operated by the Insured, that causes: (i) Property to be transferred, paid or delivered, (ii) an account of the Insured, or of its customer, to be added, deleted, debited or credited, or (iii) an unauthorized account or a fictitious account to be debited or credited. o

Telefacsimile Transfer Fraud Loss resulting directly from the Insured having, in good faith, transferred or delivered Funds, Certificated Securities or Uncertificated Securities through a Computer System covered under the terms of the Computer System Fraud Insuring Agreement in reliance upon a fraudulent instruction received through a Telefacsimile Device, and which instruction 1. purports and reasonably appears to have originated from: (a) (b) (c) a Customer of the Insured, another financial institution, or another office of the Insured but, in fact, was not originated by the Customer or entity whose identification it bears and 2. contains a valid test code which proves to have been used by a person who was not authorized to make use of it and, 3. contains the name of a person authorized to initiate such transfer; and provided that, if the transfer was in excess of $ XXXXXX, instruction was verified by a call-back according to a prearranged procedure. In this Insuring Clause, Customer means an entity or individual which has a written agreement with the Insured authorizing the Insured to rely on Telefacsimile Device instructions to initiate transfers and has provided the Insured with the names of persons authorized to initiate such transfers, and with which the Insured has established an instruction verification mechanism, and Funds means money on deposit in an account.

Computer Crime Policy For Financial Institutions Includes Coverage For: COMPUTER SYSTEMS FRAUD VOICE INITIATED TRANSFER FRAUD TELEFACSIMILE TRANSFER FRAUD EMAIL TRANSFER FRAUD DESTRUCTION OF DATA OR PROGRAMS BY HACKER DESTRUCTION OF DATA OR PROGRAMS BY VIRUS VOICE COMPUTER SYSTEMS FRAUD

Funds Transfer Insuring Agreements The Voice Initiated Transfer, Telefacsimile Transfer, and the Email Transfer Insuring Agreements provide coverage for: Transferring paying or delivering funds or property from a customers account through a Computer System in reliance upon a fraudulent instruction (Voice, Telefacsimile, Email) that was purportedly and reasonably appears to have originated from: A customer of the insured An employee of the Insured in another office of the Insured Typical Conditions Precedent for Coverage: Call back to the customer according to a prearranged procedure The Insured followed a commercially reasonable security procedure set forth in a written funds transfer agreement.

Funds Transfer Insuring Agreements What are Commercial Reasonable Security Procedures? Article 4A of the Uniform Commercial Code 4A-201. SECURITY PROCEDURE. "Security procedure" means a procedure established by agreement of a customer and a receiving bank for the purpose of (i) verifying that a payment order or communication amending or cancelling a payment order is that of the customer, or (ii) detecting error in the transmission or the content of the payment order or communication. A security procedure may require the use of algorithms or other codes, identifying words or numbers, encryption, callback procedures, or similar security devices. Comparison of a signature on a payment order or communication with an authorized specimen signature of the customer is not by itself a security Federal Financial Institution Examination Council (FFIEC) standards FDIC Authentication Guidance Examples: Call Back, Out of Band Authentication Passwords, Personal Identification Numbers (PIN), Public Key Infrastructure (PKI) Tokens Biometric Identifier

Key Exclusions Mechanical Failure of Computer System Potential Income o Interest and dividends o Unrealized gains Indirect Loss or Consequential Loss o Loss of investment opportunity, o Increases in market share o Legal settlements with third parties Loss of Intangible Property o Customer Information o Trade Secrets Contractual Liability

Claim Scenarios: Wire transfers requested via e-mail vs. voice initiated vs. online banking access. Claims involving ATMs skimming devices. Claims arising from underlying lawsuits and demands for Court Costs and Attorneys fees. Claims where Claims Expense Coverage is sought. Claims covered under 2 policies if other insurance clause can t be asserted.

???QUESTIONS???