Cyber Insurance in an Evolving Liability Landscape: Informed, Strategic Expectations Monday, February 29, 2016 2:00pm 3:00pm



Similar documents
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Discussion on Network Security & Privacy Liability Exposures and Insurance

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

HIPAA Cyber Security: Your Vendor is a Back Door to Your Server

Network Security and Data Privacy Insurance for Physician Groups

Business Associates, HITECH & the Omnibus HIPAA Final Rule

HIPAA Changes Mike Jennings & Jonathan Krasner BEI For MCMS 07/23/13

Don t Wait Until It s Too Late: Top 10 Recommendations for Negotiating Your Cyber Insurance Policy

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July Tex Med. 2012;108(7):33-37.

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Understanding the Business Risk

It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing?

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

FIVE EASY STEPS FOR HANDLING NEW HIPAA REQUIREMENTS & MANAGING YOUR ELECTRONIC COMMUNICATIONS

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

The HIPAA Omnibus Final Rule

CyberSecurity for Law Firms

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Creating Stable Security & Compliance Relationships

CYBER SECURITY SPECIALREPORT

Philip L. Gordon, Esq. Littler Mendelson, P.C.

Dissecting New HIPAA Rules and What Compliance Means For You

Business Associate Considerations for the HIE Under the Omnibus Final Rule

Joe A. Ramirez Catherine Crane

Implementation Business Associates and Breach Notification

Cyber Security: Compliance and Protection 2012 A Complimentary LexisNexis Webinar December 11, 2012

Rogers Insurance Client Presentation

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Arizona State University. HIPAA Compliance. Audit Report Number May 7, 2015

HIT Audit Workshop. Jeffrey W. Short.

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA 101. March 18, 2015 Webinar

Adventures in Insurance Land: Weaknesses in Risk Pricing & Alternatives

University Healthcare Physicians Compliance and Privacy Policy

2012 HIPAA Privacy and Security Audits

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

Are Data Breaches a Real Concern? Protecting Your Sensitive Information. Phillips Auction House NY- 03/24/2015

Why Lawyers? Why Now?

Cybersecurity: Protecting Your Business. March 11, 2015

HIPAA Compliance, Notification & Enforcement After The HITECH Act. Presenter: Radha Chanderraj, Esq.

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

BY COMPLETING THIS NEW BUSINESS APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH FEDERAL INSURANCE COMPANY (THE COMPANY )

HIPAA Compliance: Are you prepared for the new regulatory changes?

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

8 2014/2015 INSURANCE COVERAGE RENEWAL

Mitigating and managing cyber risk: ten issues to consider

Brief. The BakerHostetler Data Security Incident Response Report 2015

Overview of Topics Covered

Overview of Presentation

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Data Breach and Senior Living Communities May 29, 2015

Adding Cloud Solutions to Customer Contracts Robert J. Scott

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Recent Developments in Privacy/Security Litigation

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

HIPAA Compliance The Time is Now Changes on the Horizon: The Final Regulations on Privacy and Security. May 7, 2013

Am I a Business Associate?

Presented by Jack Kolk President ACR 2 Solutions, Inc.

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

cyber invasions cyber risk insurance AFP Exchange

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Cyber Threats and the Insurance Response

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

HIPAA OMNIBUS RULE: EXPANDED COMPLIANCE REQUIREMENTS

UPDATES FOR MEDICAL PRACTICES: RED FLAGS AND IDENTITY THEFT AND HIPAA PRIVACY CHANGES (FROM HITECH)

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015

Data Privacy, Security, and Risk Management in the Cloud

Cyber Liability & Data Breach Insurance Claims

Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges

Willis Healthcare Practice 11 th Annual Forum July 10,2007. Managing and Insuring Risks in Network Privacy/Cyber Risk

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Coverage is subject to a Deductible

Shipman & Goodwin LLP All rights HARTFORD STAMFORD GREENWICH WASHINGTON, DC

HHS Finalizes HIPAA Privacy and Data Security Rules, Including Stricter Rules for Breaches of Unsecured PHI

Insurance Solutions for Health Care Organizations

Hot Topics in Healthcare Management Liability

Business Associate Management Methodology

Enclosure. Dear Vendor,

Health information privacy and security. Norton Rose Fulbright US LLP October 6, 2015

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

ADDENDUM NO. 1 TO RFP : Locum Tenens Referrals

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Transcription:

Cyber Insurance in an Evolving Liability Landscape: Informed, Strategic Expectations Monday, February 29, 2016 2:00pm 3:00pm Kimberly B. Holmes, Esq., RPLU VP, Product Development, Chief Underwriting Office OneBeacon Insurance Group kholmes@onebeacon.com

Conflict of Interest Kimberly B. Holmes, Esq., RPLU Has no real or apparent conflicts of interest to report.

About the Speaker Kimberly B. Holmes, Esq., RPLU Vice President, Product Development Chief Underwriting Office, OneBeacon Insurance Group Ms. Holmes is responsible for Product Development across all management and professional liability product lines for OneBeacon Insurance Group as well as for providing cyber liability technical guidance and oversight across all industry segments on behalf of the company s Chief Underwriting Office. Ms. Holmes has been a frequent speaker at health care and cyber liability industry events for more than 10 years and has authored materials on health care, health care reform and health care cyber liability for various industry publications and professional liability organizations. Kim served as Deputy Worldwide Product Manager for Chubb s Health Care management liability practice for almost 10 years, in addition to developing and executing strategy and guidance as Chubb s Health Care Cyber Product Manager, helping Chubb to secure in 2012 the American Hospital Association s exclusive endorsement as cyber insurance carrier to the health care industry. Ms. Holmes is a member of the American Bar Association s Health Law section and is admitted to the Connecticut state, federal and Maine state bars.

Session Description & Learning Objectives PHI breaches and criminal hacking in the health care industry rose dramatically in 2015 mandating that organizations have a tailored, solid cyber insurance program in place before and after a breach. With heightened OCR scrutiny and audits coming in 2016, documenting your organization s privacy and security best practices and procedures has never been more critical. Making assumptions about what types of insurance should protect your organization in the wake of a data breach can be risky, and so is not watching your business associates closely. Learning Objectives: Evaluate cyber insurance options and how different coverages are designed for different exposures stemming from a malicious service disruption or other form of data breach event Explain the pitfalls of making assumptions regarding what various (non-cyber) insurance products may/may not address in the wake of a health care cyber /data privacy breach event Describe evolving cyber liability trends in the health care industry Assess how to mitigate your organization s liability (under federal and state law) before a malicious hacking or other data breach occurs Summarize the benefits of well-planned and executed business associate agreements while evaluating how and why it is critical to monitor these relationships on an ongoing basis

Today s Cyber Insurance Landscape:

Challenges for Cyber Insurance Industry Today: Lack of Sound Actuarial Data Disproportionate Disclosure vs. Breach Frequency Decision Makers Often Not Convinced Insurance is Needed Evolving Litigation Claims Landscape

Evaluating Cyber Insurance Options: What Coverage Covers What?

Types of Cyber Insurance Coverage Available Third Party Liability: Cyber Liability (Standard Insuring Clause) First Party Costs: Privacy Notification Expenses Crisis Management Expenses (PR, Forensic, Legal, Reward) E-Business Interruption Expenses E-Theft Loss E-Communication Loss E-Threat Expenses (Extortion) E-Vandalism Expenses

Evaluating Cyber Insurance Options: Knowing Your Organization s Needs

Types of Cyber Insurance Coverage Available Dedicated cyber liability products: Standalone (monoline) products Portfolio & Package products Network Security coverage Privacy coverage 1 st Party Costs coverage 3 rd Party Liability coverage

Types of Cyber Insurance Coverage Available Sub-limits on traditional non-cyber products: D&O (Director & Officer Liability) coverage E&O (Errors & Omissions Liability) coverage Professional Liability coverage Hospital Professional Liability Physician Professional Liability Miscellaneous Professional Liability GL/P&C coverage

BEWARE Assuming Other Insurance Will Fully Respond to your Breach

Pitfalls in Assuming Other Insurance will fully respond to your Breach Wrongful Act definitions may trigger, but only for 3 rd party liability (defense/settlement) exposures No 1 st Party coverage (Notification mandated under HIPAA for PHI breaches) Other policy exclusions may apply to limit coverage Bodily Injury exclusion Internet exclusion Computer systems exclusion Acts of foreign government exclusion Intentional acts exclusion

Evolving Cyber Liability Trends in the Health Care Industry

Recent Market/Claim Developments:* Hacking frequency in health care industry significantly on the rise in 2015: Texas Health and Human Services (2 million individuals; Nov., 2015) Excellus BC/BS (10 million individuals; Sept., 2015) UCLA Health System (4.5 million individuals, July, 2015) Office of Personnel Management (21.5 million individuals; June, 2015) Premera (11 million individuals; March, 2015) Anthem (80 million individuals; Feb., 2015) *http://www.privacyrights.org/data-breach/new

Recent Judicial Developments: November, 2015: ALJ dismisses FTC action against LabMd Impacts FTC ability to prosecute data breach actions under FTC Act FTC failed to show LabMd s conduct harmed or would harm consumers as required by unfairness prong of FTC Act (alleging data breaches are de facto unfair trade/business practice ) September, 2015: 7 th Circuit declined to hear appeal on Neiman Marcus case; plaintiffs have standing to proceed without actual damages Plaintiffs may proceed to sue for damages to prevent identity theft/fraud in wake of data breach even before actual identity theft/damages occur

Recent OCR Developments: (per Jocelyn Samuels, OCR Director, speaking at recent Healthcare Enforcement Compliance Institute, Wash. D.C.) Impending launch of countrywide HIPAA Phase II audits, early 2016 Compliance (aka, ENFORCEMENT) is focus Desk audits principally the focus CEs AND BAs will both be subjects of audits Audit protocols to be released prior to Phase II launch OCR Major Concerns: CE ongoing failures to address known issues and deficiencies Lack of encryption Lack of BAAs

Mitigating Your Organization s Liability BEFORE a Breach Occurs

BEFORE the Breach happens ENCRYPT, ENCRYPT, ENCRYPT DOCUMENT, DOCUMENT, DOCUMENT policies/procedures & training DISSEMINATE & COMMUNICATE to entire organization Conduct a thorough, organization-wide, risk analysis (yourself or with an outside vendor) Document action plan to address findings/deficiencies Identify resources that will be committed to address above findings/deficiencies Confirm your Breach Response Team (internal points of contact, outside legal counsel, outside vendors, local/regional FBI and HHS office contacts) Actually USE your Incident Response Plan (IRP) & Document Findings

Remember OCR is tired of reminding CEs to do the basics Encryption, Risk Analysis, put BAAs in place No need to ask for trouble - ADDRESS THESE FIRST DOCUMENT what you ve done/assessed/found/identified to fix or address; if it s not written down, it never happened OCR review/scrutiny will all be Monday morning quarterbacking of your efforts have evidence you ve really done what you say you ve done A coordinated response on the front end among all your Breach Response team members ensures a more seamless outcome on the back end OCR has stated that it is not looking to put non-compliant organizations out of business, and will consider an organization s resources when assessing fines/considering settlements IRPs should be dynamic, active tools that you assess, update, reconfigure as needed NOT a static document that sits on the shelf

Business Associate Agreements: Best Practices to Consider

Business Associate Agreements WHAT they should include: Audit Rights for the Covered Entity (CE) CE right to review BA contracts with subcontractors CE right to inspect: BA facilities, infrastructure, security systems BA books and records BA Responsibilities Financial obligations Indemnification obligations Action obligations in the wake of a breach Notification to affected individuals, media, HHS

Business Associate Agreements WHY they should include outlined rights and responsibilities.and be audited regularly: You want to show OCR that you are aware of your ultimate liability (and responsibility) as a CE for a breach of your PHI on your BA s watch awareness & action on your part may mitigate your liability in OCR s assessment after the fact If you ve negotiated the rights to inspect, audit, review: DO IT you ve set the floor now on your due diligence responsibility If you find deficiencies upon audit, INSIST that your BA remediate them and document the exchange to evidence your best efforts to address the noncompliance Having clear indemnification provisions (if possible) allows an insurance carrier to see an avenue of potential recovery should your policy be triggered by a breach event/claim Notification costs can be extensive depending on the number of PHI records at issue; have who s paying for it clearly spelled out in the BAA

Summary Many different cyber insurance coverage options exist; identify your organization s exposures, coverage needs, and customize terms accordingly to maximize the coverage your organization needs for the premium dollars spent Depending on the size of your organization and number of PHI records, absorbing the bottom line cost of a data breach, uninsured, can be devastating. Do NOT assume that other non-cyber insurance products can substitute for a standalone cyber insurance product. Hacking frequency is significantly increasing in the health care industry as it is widely known that health care lags behind other industry sectors in IT infrastructure while at the same time widespread sharing of electronic PHI is increasing astronomically OCR s planned launch of HIPAA Audits Phase II during 2016, focusing on desk audits and compliance, should underscore the need to document, document, document your organization s ACTIVE cyber best practices BEFORE a breach event occurs Business Associate Agreements (BAA) are a must to have in place to satisfy OCR audit review, but actively auditing your Business Associates routinely (as provided for in the BAA) shows the due diligence that may reduce your organization s exposure after a breach

Questions? kholmes@onebeacon.com