Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
Products Liability and Insuring Protection ForanGlennonPalandechPonzi&Rudloff PC.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
INFORMATION SECURITY & PRIVACY OVERVIEW September 23, 2014.
Recent Trends and Insurance Considerations March 2015
Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
ICSA Professional Indemnity, Directors & Officers Insurance for Financial Institutions Magnus McGurk, Business Development Manager, SME Professional Lines.
Protection Detail: Insurance Coverage in 2012 Presented By: Nezih Hasanoglu and Kim Singleton M3 Insurance Solutions for Business.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
Insurance Coverage for IT Security Breaches International Technology Law Association San Francisco, CA – May 4, 2006 Steven Brower Stephan Oringher Richman.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Winning With Chubb Writing Technology Business in a Challenging Marketplace April 24, 2012.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
AUGUST 25, 2015 Cyber Insurance:
HIPLA/UH 20 th Annual Fall Institute 2004 Managing Intellectual Property Exposure Tough Market, Creative Solutions Joby Hughes Joby A. Hughes, P.C. Friday,
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
David Barrett – Simmons & Simmons Stephen Wares – Hiscox Lisa Hansford-Smith - MARSH Products vs Services and what type of insurance solution is required.
. E-Business Risk and Insurance.
17 - 1Copyright 2008, The National Underwriter Company Professional Liability/Errors & Omissions Insurance  What is it?  Individual’s or organization’s.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
Being there When you need us Thats our policy. Cyber Awareness – what can be done?
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Cyber Risk Management and Insurance
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Financial Institutions – Cyber Risk
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance – FFs & CHBs
Can Cyber Insurance Stand in the Data Breach
Responding to Intrusions
Cyber Insurance Overview
Cyber Insurance: An Update on the Market’s Hottest Product
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
By Joseph Carnevale, CIP Partner & Director of Sales
Forensic and Investigative Accounting
Retirement Benefit Fund, Trustee and Third Party Provider Insurance
Cyber Security: What the Head & Board Need to Know
Anatomy of a Common Cyber Attack
Presentation transcript:

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada

This document is advisory in nature. DISCLAIMER This document is advisory in nature. The views, information and content expressed herein are those of the authors and does not necessarily represent the views of any of the insurers of The Chubb Group of Insurance Companies. Chubb did not participate in and takes no position on the nature, quality or accuracy of such content. The information provided should not be relied on as legal advice or a definitive statement of the law in any jurisdiction. For such advice, an applicant, insured, listener or reader should consult their own legal counsel

Agenda Difficulty Insuring Cloud Exposures Insurance Coverage Available E&O Insurance Technology Risk Spectrum Underwriting Considerations ‘I’ve been hacked!’ Q&A

Difficulty in Insuring The Cloud How do you insure the data? Data is not at rest in one location; schedule on property policy? Data is in the care, custody or control of a third party Business Income coverage typically excludes on line access providers Carriers may provide sublimits for loss of utilities type contingent business income coverage Errors and Omissions Review definition of ‘your product’ and ‘your service’ Ensure cloud computing activities not excluded Confirm no exclusion for loss of internet service

Insurance Coverage Property General Liability Errors and Omissions Contingent Business income Check exclusions. Must be a physical damage trigger Usually sublimited. May purchase additional limits Electronic Data May need to schedule on an ‘any other location’ basis Impairment of Computer Services Business income and electronic data recovery costs due to an attack to the insured’s network General Liability Privacy Has migrated to the E&O policy Errors and Omissions Originally covered financial loss due to a product defect or service deficiency Now expanded into the world of intellectual property, privacy, and ‘cyber’ coverage

Technology Insurance Solutions Errors & Omissions Third Party Product and Service Financial Injury Privacy & Network Security Intellectual Property (patent excluded) Media First Party Privacy Remediation Expense Insured’s reasonable and necessary expenses incurred after a data breach: Public Relations Notification Forensics Credit monitoring

Technology Risk Spectrum CUSTOMERS CONSUMER & REGULATORY RESPONSE COMPETITORS & IP RIGHTS Breach of Contact Failure to Perform Services Product Defects Use of technology is ubiquitous, exposures are pervasive Disclosure, Publication or Use PII/BCI Privacy Remediation Expenses Fines and Penalties IP / Injunctive Relief Media / Libel / Slander 7

What do Underwriters need to know? Contracts Operational exposures (human resources, network and physical security management) Cloud Resiliency and Redundancy Corporate governance in respect of IT and Privacy Content, Transactions & e-commerce exposures Risk Management and Loss Control attitude Ability to recover from a loss Claims History

‘I’ve been hacked!’ Contact your Insurance Broker and/or Carrier Contact Legal Counsel who specializes in data breaches Engage third party experts to assist with investigation and remediation Offer customers credit monitoring services Engage a skilled public relation specialist Contact Law enforcement, if applicable Contact a Breach Coach

Breach Coach A Breach Coach can help you determine: Is a computer forensics investigation needed? Are breach notifications required? What is the potential for regulatory fines or penalties? What is the potential for legal action? What are your next steps?

Thanks for your time