Cyber Liability: New Exposures Presented by: Henriott Group © 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
There are different threats and impacts that affect an organisation. Threats are things that the organisation will get attacked by so for example viruses.
Crime and Security in the Networked Economy Part 4.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.

Boyertown Area School District Acceptable Use Policy.
Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
1 © 2008 Venable LLP Top 5 Technology Legal Traps for Associations Venable LLP August 24, :45 AM – 12:00 PM ASAE Annual Meeting Los Angeles, CA.
INTERNET LIABILITY Internet Liability Richard Batchelder Corporate Underwriting American Re-Insurance Company 1234.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
CAMARGUE COMMERCIAL CRIME Presented by Justin Keevy Senior Underwriter.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Overview of Cybercrime
Defining Security Issues
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Electronic Use Policies.   Social Media  Internet.
2 September 2015 Building Scalable Insurance Programs For Each Growth Stage of a Entrepreneurial Company.
AUGUST 25, 2015 Cyber Insurance:
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
Unethical use of Computers and Networks
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Monitoring Employees on Networks: Unethical or Good Business?
Internet Risk Kevin Rooney General Reinsurance
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Insurance Community University Website Review - The Five Key Areas You Must Review On A Client’s Website Presented By: Marjorie L. Segale, AFIS, CISC,
. E-Business Risk and Insurance.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Virtual Business Virtual Communication Copyright © Texas Education Agency, All rights reserved.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
The Pitfalls of the Small Business Owner Protect Your Assets!
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
MEDICAL OFFICE COVERAGES. This is a short review over many insurance coverage parts necessary to a doctor’s practice. Not all apply, and there are other.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Financial Institutions – Cyber Risk
Fundamentals of business law, 10e
E&O Risk Management: Meeting the Challenge of Change
Cyber Insurance Overview
Cyber Insurance: An Update on the Market’s Hottest Product
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Cyber Exposures The Importance of Risk Identification and Transfer
Forensic and Investigative Accounting
Presentation transcript:

Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.

New Economy, New Exposures Business shift: “Bricks and Mortar” to “Clicks and Orders” Online business is bigger than ever Public Web presence for all to access Explosive growth in the 21 st century One billion websites and growing!

New Exposures Net expansion outruns General Liability (GL) coverage Existing policies do not account for Web-based liabilities Data theft is commonplace Increasing intellectual property liability claims

New Exposures Employee misuse of websites, s and other electronic communications that involve: Harassment of other employees or outside individuals Accidental or purposeful slander or copyright infringement Use of pirated or unstable software Misuse of company data

Economic Exposures Trademarks Copyright implications Intellectual property rights Defamation Security Systems failures

Trademarks Risks: Cyber-squatting Registering domain names without consent Deep linking Linking to Web pages within sites Using unauthorized links To websites without consent

Copyright Implications Risks: Unlicensed duplication of copyrighted material Theft or unauthorized distribution of trade secrets, customer lists, etc.

Intellectual Property Rights Risks: Website content Ownership issues Who owns what content? What is the scope of the licenses? Patent infringement How to manage: Decrease legal liability with “terms-of-use” agreement Security and encryption concerns Review methods of authenticating information

Defamation Risks: Defamatory statements Opinions versus facts Postings Via websites Forums Publications Blogs Online bulletin boards

Data Security Risks: Collection, storage and use of information Privacy issues Security breaches Risk Management: Data Security Policy Data Encryption Employee Training Transfer liability to third-party vendor

Systems Failures Risks: Virus attacks Physical damage or interruption to servers Natural disasters

Employee-Related Exposures Employment liabilities Privacy violations Discrimination and harassment

Privacy Violations Employees claim their privacy rights were violated after the employer reviewed s or personal files Employees claim privacy violations for website tracking or blocking of Internet sites

Discrimination and Harassment Employees receive unwelcome verbal, visual or physical conduct that is sexual or discriminatory in nature Conduct interferes with employee’s work Employee feels violated and uncomfortable on the job Conduct occurs via , forum posts on the Internet or by physically showing another employee explicit websites

Misuse of social media can open a company up to a variety of risks Keep track of what’s being said about your company online, through social networks and blogs Social Media Exposure

Cyber Liability Insurance Scope: Any company with a Web presence or performing e-commerce activities Coverage: Intangible economic losses Destruction of home pages Network and server failure Unauthorized obstruction of customer information Restoration costs Fake orders Viruses Industrial espionage Base Rates: Overall revenues

Solution Options Internet Liability Insurance Covers for loss caused by fraudulent alteration or destruction of electronic information such as: Malicious copying of trade secrets Extortion, virus versus ransom Loss of business income caused by virus or destruction of electronic information

Solution Options Media Liability Insurance Includes coverage for: Libel and slander Invasion of privacy Infringement of copyrights Intellectual Property Network Security Product Recall

Features Occurrence policy Claims Made Policy with extended reporting periods (ERP) Duty to defend Punitive damages Jurisdictional

Possible Exclusions Typically, a traditional Commercial General Liability (CGL) policy will afford you coverage for business interruption, intellectual property damage, and similar losses. However, insurers are avoiding liability by including specific exclusions and requiring endorsements for this coverage. Therefore, a careful review of policy language is necessary.

Claim Example ü Corrupted data Example: A communications company sues for lost revenue and expenses to recover billing files for wireless customers that were deleted by their software vendor who was updating the system. Indemnity Paid: $750,000 Defense Costs Paid: $150,000

More Examples n 130 million credit card numbers were stolen from Heartland payment Systems (HPS) by an outside hacker n HPS’s stock price had fallen 74% 45 days after the breach n The breach cost HPS upwards of $70 million n Kaiser Permanente was fined $200,000 for publicly posting 150 patient names, addresses and medical records on their website n A 2012 data breach insurance claims study done by Net Diligence found that the average cost of legal defense for a data breach was $582,000 and the average cost of a settlement was over $2 million!

Cyber Liability: New Exposures New Solutions from Henriott Group