CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure



Similar documents
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Privacy Rights Clearing House

Enterprise PrivaProtector 9.0

Wellesley College Written Information Security Program

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Rogers Insurance Client Presentation

Network Security & Privacy Landscape

Data Breach and Senior Living Communities May 29, 2015

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

ACE Advantage PRIVACY & NETWORK SECURITY

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Managing Cyber & Privacy Risks

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Joe A. Ramirez Catherine Crane

Cyber Liability. What School Districts Need to Know

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

Zurich Security And Privacy Protection Policy Application

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

Data security: A growing liability threat

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

DATA BREACH COVERAGE

F G F O A A N N U A L C O N F E R E N C E

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

I ve been breached! Now what?

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

National Cyber Security Month 2015: Daily Security Awareness Tips

Cyber Risks and Insurance Solutions Malaysia, November 2013

ISO? ISO? ISO? LTD ISO?

Responsible Access and Use of Information Technology Resources and Services Policy

Cyber Security. John Leek Chief Strategist

Information Security Law: Control of Digital Assets.

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Privacy and Data Breach Protection Modular application form

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Cybersecurity Issues for Community Banks

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

BUSINESS ONLINE BANKING AGREEMENT

(1) Commercial Crime Insurance or Employee Fidelity Bond

Cybersecurity Risk Transfer

Cyber, Security and Privacy Questionnaire

What is Cyber Liability

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

My Docs Online HIPAA Compliance

CyberSecurity for Law Firms

College of DuPage Information Technology. Information Security Plan

Insuring Innovation. CyberFirst Coverage for Technology Companies

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Transcription:

CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure

CYBER-LIABILITY COVERAGE: The $ 45Million Dollar Exposure Today s Presenters: Mark J. Camillo, MBA, BS Head of Network Security and Privacy Products AIG Jill Haynes Gidge, CPCU, CIC, CISR, CRIS, AAI, AAM, AIT, CPIW, AIS, BSN, RN Independent Insurance Education Consultant /Trainer Insure-Ed Brad Vatrt, BA, JD Complex Claim Director for Network Security/Media/Technology Group AIG

DATA BREACH 2012-2013* Number of Breaches 825+ and rising Number of People Exposed 13,498,996+ and rising Location of Breaches Educational facilities Banking, credit / financial Government / military Healthcare facilities and companies Data / information companies Utilities / hospitality / retail * Federal Trade Commission Are you and your clients protected?

DATA BREACH 2012-2013 (2) Average cost per data breach loss $ 203,000- $ 591,000 (42% increase)* 30-40% growth in overall data breach / cyber security claims Cyber-liability no longer a back burner issue 17% of firms had Enterprise-wide risk approach in 2008 72% of firms have Enterprise-wide risk approach in 2012 *Ponemon Institute Research Report 2012

WHAT CONSTITUTES A DATA BREACH? The intentional or unintentional release of secure information (data leak, data spill) to an unsecure or non-trustworthy environment "A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so * * Wikipedia

Overview of Key Federal & State Laws Impacting Data Breach/Cyber-Liability Health Insurance and Accountability Act Drivers Privacy Protection Act Fair Credit Reporting Act Gramm-Leach-Bliley Cyberspace Electronic Security Act USA Patriot Act Cyber Security Enhancement Act Standards for Safeguarding Customer Information Fair and Accurate Credit Transaction Act Red Flags File Transfer Compliance Massachusetts 201 CMR 17

Health Insurance & Accountability Act Health Insurance & Accountability Act Protections for individuals Use, disclosure and transmission PHI Privacy Rule Protect confidentiality Security Rule Safeguards to protect the confidentiality, integrity and availability

Drivers Privacy Protection Act DMV & MVRs Personal Information Photograph Social security # Name Address Telephone number Medical / disability information PFI

Fair Credit Reporting Act Individuals only Protect privacy & assure accuracy Collection & dissemination of information, redress More PFI

Gramm-Leach-Bliley: Financial Services Modernization Act Protection of consumer s non-public personal financial information Includes information utilized by agents and brokers Compliance mandatory!

Cyberspace Electronic Security Act Protection Standards set for Privacy Security Safety Encryption Symmetric key Asymmetric key Https://

USA Patriot Act Investigation of Terrorism Ensure domestic security Surveillance Money Laundering Increase of Power 4 th amendment

Cyber-Security Enhancement Act of 2002 Set sentencing Guidelines Relative to certain computer crimes

Regulation 173 Standards for Safeguarding Customer Information Risk assessment required Manage and control cyber-risk Oversee service provider arrangements Evaluate, monitor and adjust the program

Fair and Accurate Credit Transaction Act Free credit reports annually from each reporting agency without harm to credit score Fraud alerts Ability to opt-out of affiliate marketing Protection against unauthorized access Requirement to exercise due diligence

Red Flags Written Identity Theft Prevention Program Detects warning signs ( red flags ) of ID theft Step 1: Identifying relevant red flags Step 2: Detecting red flags Step 3: Responding to red flags Step 4: Administering the Program

File Transfer Compliance 201 CMR 17 Establishes a minimum standard for the protection of Massachusetts residents personal information (PFI and PHI) both in electronic and paper form Written security program required Other states may follow!

Who Has A Cyber-Liability Exposure? Any person or business with web site Size is immaterial here! Can be subject to claims for Damage caused to another computer when interfacing or downloading Damage to data or software Remember: Electronic data is not tangible property (ISO forms)

Where Is Cyber-Liability Coverage Available If At All? ISO Commercial General Liability Coverage Form CG 00 01 Definitions 17. Property Damage Damage to, loss of, destruction of tangible physical property including its loss of use electronic data is NOT tangible property Exclusions j. Damage to property o. Personal & advertising injury p. Electronic Data

Where Is Cyber-Liability Coverage Available If At All? (2) Coverage B Personal and Advertising Injury Liability (ISO CGL) Definitions 14. Personal and advertising injury 17. Property damage Exclusions Especially i and j Chatrooms, bulletin boards, web hosts, webmasters, etc.

Where Is Cyber-Liability Coverage Available If At All? (3) ISO Electronic Data Liability Endorsement CG 04 37 Buy back liability coverage (for negligence in data damage, etc.) Loss of electronic data now a category of property damage (direct damage) C. Definitions Data STILL not tangible property

Where Is Cyber-Liability Coverage Available If At All? (4) ISO Electronic Data Liability Coverage Form CG 00 65 Broader coverage Actual loss of data covered No need for physical injury to tangible property Claims made format!!!! Covers loss caused by electronic data incident

Where Is Cyber-Liability Coverage Available If At All? (5) ISO Businessowners Policy Electronic Data Liability Limited Coverage Endorsement BP 05 95 Similar to CGL version for direct damage to data of others due to insured s negligence Electronic Data Liability Broad Coverage Endorsement BP 05 96 Similar to ISO Electronic Data Liability Coverage Form, but as an endorsement

Where Is Cyber-Liability Coverage Available If At All? (6) Cyber-Liability Insurance First & third party risks Privacy Infringement of intellectual property Virus transmission E-business, internet, networks Who needs it??

Where Is Cyber-Liability Coverage Available If At All? (7) Network Risk Insurance Private and Public companies Exposures covered vary What does it do? Protection against unauthorized access to data Theft of data (crime) Computer viruses (direct damage, loss of use) Distributed Denial of Service (DDoS) attacks Loss/Corruption of Data

Where Is Cyber-Liability Coverage Available If At All? (8) Network Risk Insurance ( cont d) Protection against unauthorized access to data (cont d) Business Interruption Liability Cyber-Extortion Public Relations Criminal Rewards Cyber-Terrorism Identity Theft

Cyber-Liability 2013 Most Common Internal Security Threats Mark Camillo Most Common Reasons for Data Breach Litigation Brad Vatrt OMG!

Cyber-Liability 2013 (2) Costs of cyber-risk Approaches to cyber-risk Carrier perspectives

Cyber-Liability Risk Management Physical security Privacy policies Established procedures Employee training Encryption Firewalls Passwords Anti-virus, anti-spyware software Cyber-hygiene function Copyright review

Cyber-Liability Risk Management (2) Shred! (cross-cut best) Awareness of operations / activities involving data Be proactive prevent / reduce risk potential before loss happens Duplication and segregation of data (Cloud, recovery and storage vendors, etc.) Question what s done, why Assess risk On a personal note: Know your score

Cyber-Liability Risk Management (3) Password expirations Password history Password length (8-11 characters) Password composition (upper, case, lower case, symbols, numbers)

It s A Wrap! Thank you for attending our presentation! Please complete an evaluation Have a great rest of your day, and CONGRATULATIONS to all the new designees!

Session Feedback Please rate this session using the mobile app