THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill



Similar documents
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

NZI LIABILITY CYBER. Are you protected?

Managing Cyber Risk through Insurance

Cyber and data Policy wording

How To Cover A Data Breach In The European Market

Cyber-Crime Protection

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION

CYBER RISK INSURANCE. Presented By: Jonathan Healy

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

CYBER RISK SECURITY, NETWORK & PRIVACY

Cyber and Data Security. Proposal form

Cyber/ Network Security. FINEX Global

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Understanding the Business Risk

Joe A. Ramirez Catherine Crane

Mitigating and managing cyber risk: ten issues to consider

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

What would you do if your agency had a data breach?

cyber invasions cyber risk insurance AFP Exchange

Cyber Threats: Exposures and Breach Costs

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

ISO? ISO? ISO? LTD ISO?

Cyber Insurance Presentation

APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY

CYBER/ NETWORK SECURITY

Specialist insurance and risk implications for prepaid an update. Prepaid International Forum Osborne Clarke London Thursday 9 th February 2012

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Coverage is subject to a Deductible

Information and Communication Technology, Cyber and Data Security

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insurance in Private Practice March 2015

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

Cyber Exposure for Credit Unions

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Insurance for Data Breaches in the Hospitality Industry

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Security & Privacy Current cover and Risk Management Services

Cybercrime: risks, penalties and prevention

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Statutory Liability Insurance

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Specialist Miscellaneous Professions (Legal Liability) Professional Liability Insurance Summary

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

Zurich Security And Privacy Protection Policy Application

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Network Security & Privacy Landscape

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cyber Risks October

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

Cyber Risk State of the Art

Architects and Engineers Professional Liability Insurance Summary

Privacy Rights Clearing House

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Cyber Insurance as one element of the Cyber risk management strategy

Cyber and CGL Insurance Coverage for Data Breach Claims

Making Sense of Cyber Insurance: A Guide for SMEs

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Cyber Risk Management

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cyber Risks and Insurance Solutions Malaysia, November 2013

Enterprise PrivaProtector 9.0

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Construction Consultants Professional Liability Insurance Summary

Beyond Data Breach: Cyber Trends and Exposures

Cyber Liability Insurance

Cyber Liability. What School Districts Need to Know

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

Cyber Liability Insurance: It May Surprise You

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

How To Protect Your Data From Being Hacked

The potential legal consequences of a personal data breach

Privacy and Data Breach Protection Modular application form

Business Insurance Professional indemnity section for RIBA &/or RIAS architects Summary of cover

Rogers Insurance Client Presentation

GRC/Cyber Insurance. February 18, Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

CYBER LIABILITY INSURANCE

Data Breach and Senior Living Communities May 29, 2015

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

Guidance on data security breach management

4/30/2015 CYBER LIABILITY AND AVIATION AGENDA LEARNING OBJECTIVES. Presented by Hal Hunt May 3, 2015

MEDIATECH APPLICATION

DATA BREACH COVERAGE

Fraud and Abuse Policy

Cyber Threats and the Insurance Response

How To Buy Cyber Insurance

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Transcription:

THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill

What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI

The scope of cyber insurance First party coverage Breach response costs comprising: Forensic costs (i.e. identifying there has been a breach, the source of the breach, the extent of the breach and shutting the vulnerability off) Notification to data subjects Notification call centre Credit monitoring Legal costs and PR costs Claims example: A large data processor lost back up tapes in transit. They contained personal data of army veterans. Their cyber policy met the costs of notification, call centres and credit monitoring

Fines and penalties: FCA fines not insurable under English law (Chapter 2 of CP191 of the FSA Handbook). Safeway v Twigger [2010], Claimant could not recover OFT fines from D&O insurers. Under English law, no express ban on indemnifying against ICO fines; however, ICO fines not likely to be insurable as a matter of public policy. PCI fines are contractual damages and therefore insurable. Cover fines where insurable until there is greater certainty.

Cyber business interruption Loss of income due to network security failure Additional expenses associated with getting back online Claims example: Sony PlayStation Network offline for period of time owing to security compromise resulting in loss of income. Data restoration costs Costs associated with restoring or recreating data following network security failure Additional expenses associated with getting back online

Cyber extortion Sums paid to criminals who, for example, issue threat of DDoS attack if ransom is not paid Alternatively, sums paid to criminals e.g. to withdraw existing DDoS attack or for the return of sensitive information Costs associated with instructing investigator

Cyber crime Theft via computer systems Loss due to unauthorised and fraudulent access to electronic communications Claims example: Criminals can hack into the computer system and direct telephones to call premium rate numbers (most telephone networks are now linked to computer network via voiceover IP)

Third party coverage Traditionally comprises three heads of cover: 1. Privacy Liability 2. Security Liability 3. Multimedia Liability

Privacy liability Cover for: Losses arising out of actual or suspected disclosure of personal data and/or credit card information via computer systems, laptop, data storage device, paper records. Claims arising out of: invasion of privacy of the individual; breach of privacy-related legislation e.g. The Data Protection Act 1998

How these claims may be advanced under English law: Breach of confidence Misuse of private information Breach of contract or negligence Claim for compensation under Section 13 of Data Protection Act 1998 If all domestic avenues exhausted, claim under section 7 of Human Rights Act 1998 for breach of Article 8 of the European Convention on Human Rights (right to respect for private and family life)

Claims examples: Data processor lost back up tapes in its custody. Following notification of the data breach, proceedings commenced by affected individuals. Claimants alleged invasion of privacy by public disclosure of private facts. Price comparison website referred customers to an IFA, which turned out to be a criminal organisation. The IFA used customers details to perpetrate various frauds against them. Affected parties issued a claim for invasion of privacy and negligence. A university doctor s work laptop stolen, which contained the medical records of his patients. Following notification of the breach, proceedings were issued by affected individuals.

Security liability claims Cover for: Losses arising out of virus transmission or hacking attack from the Insured s computer system and failure to facilitate authorised access to computer network. Claims arising out of : Hacker/employee utilising without authorisation computer network to commit fraud, theft or DDoS attack (i.e. via unauthorised access to computer network). Transmission of viruses (inadvertently or by employee with vendetta) (i.e. one computer network attacking another). How these claims may be advanced under English law Breach of contract or negligence

Claims examples: Online retailer engaged marketing company to distribute promotional emails to its customers. An email contained a link with embedded malware designed to record keystrokes. Affected customers issued claim against online retailer (PL insuring clause), which in turn claimed for an indemnity against marketing company. Tech company employee sent an email to client containing a virus, which took down their entire network. Client issued claim against tech company alleging breach of duty. Software company working on the development of prototype mobile telephone, on behalf of major tech company, were hacked by organised hacking group in China, which resulted in he theft of sensitive IP. Tech company issued claim against software company.

Multimedia liability Claims arising out of: Defamation e.g. tweets, blogs IP infringement How these claims may be advanced under English law: Libel/slander Breach of copyright Trademark infringement

What isn t typically covered under a cyber policy? Patent infringement The cost incurred by management dealing with enquiries from affected data subjects (not easily quantifiable) Virus software upgrades Security consultants Replacement or repair of physical item e.g. stolen laptop, failed server

Do other policies cover cyber losses? Property & Crime/Bond (data not tangible property; absence of IPG) EL/PL(focus on personal injury) K&R (not concerned with data expect maybe when for purposes of extortion) PI/E&O(typically only covers claims arising out of professional services, specific exclusions for data related losses)

UK vs US Too much emphasis in domestic market on US law/wordings? US policies have been transferred into domestic market PII/PHI versus personal data Claimant s costs Mandatory notification in UK limited to ISPs and telecos, at present. Draft EU Regulation. Notification should, however, be encouraged. ICO likely to issue significant fines if they suspect a cover up