The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.

Slides:



Advertisements
Similar presentations
Chicago - March 29-30, PLUS Medical PL Symposium IMPACT OF SOCIAL MEDIA ON INSURANCE COMPANIES.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.
Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
September 14, 2011 Network Risk/Privacy Insurance Exposure and Coverage Issues.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
2 September 2015 Building Scalable Insurance Programs For Each Growth Stage of a Entrepreneurial Company.
AUGUST 25, 2015 Cyber Insurance:
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
New A.M. Best Cyber Questionnaire
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Network Security & Privacy Discussion Colorado Community Health Network April 14, 2014 Presented by: Kevin Keilbach – Client Executive – Health Care Jeff.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
PARTNERING TO CREATE THE SAFEST HEALTHCARE SYSTEM Insurance Operations Update HIROC Risk Management Conference April 28, 2014 Heather Brown, Vice President.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
MEDICAL OFFICE COVERAGES. This is a short review over many insurance coverage parts necessary to a doctor’s practice. Not all apply, and there are other.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
New A.M. Best Cyber Questionnaire
Financial Institutions – Cyber Risk
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
E&O Risk Management: Meeting the Challenge of Change
Insurance Technology Forums: ‘IT Matters’ Forum
Managing a Cyber Event Steven P. Gibson President
Responding to a Data Breach 360° of IT Compliance
Liability Coverage Structure Self Insured Retention ($3M)
Cyber Insurance Overview
Cyber Insurance 101 South Texas Chapter Risk & Insurance Management Society May 17, 2017 Matt C. Green, Marsh.
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Liability Coverage – Sell it or get sued
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008

History of Network Security & Privacy Insurance (5 min) Coverage Terms and Underwriting Process (20 min) Questions & Answers (5 min) Agenda

“ Cyber Insurance” circa The First Policies Were Strictly for Online Companies –Media Coverage as “Gap Filler” –Weak Network Security Coverage with Significant Underwriting –No Coverage Unless a Breach of Network Security Took Place –No First-Party Coverage –Expensive

Current Network Security & Privacy Policies Coverage for Any Company –Network Security Coverage with Much Less Underwriting –Privacy Coverage Without a Breach of Network Security Trigger –Full First-Party Coverage –Full Offline Media Coverage –Attractive Pricing

Liability Coverage Triggers Security Liability –Failure of a computer system to prevent a breach of your computer security –Physical theft of hardware from the premises occupied and controlled by the insured Privacy Liability –Unauthorized disclosure or your failure to protect personally identifiable information from misappropriation –Violation of a non-disclosure agreement, your privacy policy, or an applicable privacy law

Liability Coverage Terms Network Security & Privacy coverage for Claims –Acts of Rogue Employees and Independent Contractors –Information on Laptops or other Devices Lost or Stolen Off-Premises –Regulatory Defense, Fines, and Penalties –Violation of Statute, including Notice Laws –Violation of an Insured’s Privacy Policy The Mitigation of Claims –Credit Monitoring, Call Center, Crisis Management, Costs to Comply with Notice Laws

First Party Coverage Crisis Management Coverage Public Relations Expenses Mandatory Notification Expenses Discretionary Notification Expenses Credit Monitoring Services Identity Theft Education and Assistance, including Expense to Set up and Maintain Call Center

First Party Coverage Business Interruption and Extra Expense Coverage –Outsourced Network Operations –Both Online and Network-Dependent Offline Income –Expense for Forensics and to Restore Operations –Hourly Value on Business Interruption Losses –Expense to Restore Data Electronic Theft Coverage –Theft of Money, Intellectual Property, or Actual Price of Services Network Extortion Coverage –Extortion Demand Payment

How Much is This Going to Cost? Terms are Driven by –Industry Sector and Revenue –Risk Controls and Practices –Claims History –Market Environment Sample Liability and Crisis Management Pricing

Underwriting Process Sample Application Questions –Do you have a written corporate-wide privacy policy? –Do you have a document retention and destruction policy? –Do you employ a chief privacy officer? –Do you provide training for employees on privacy, data security and related issues? –Have you completed an outside privacy audit or have you received a privacy certification? –Have you completed an internal audit or assessment to determine your compliance with regulations and laws concerning the protection of privacy rights ? –Do you have an enforced clean-desk policy?

Hilb Rogal & Hobbs Company Paul Paray Senior Vice President Co-Practice Leader HRH Network Security & Privacy Advisory Group Office: Cell: