Hot Topics in Privacy & Security Law Presented by Robert J. Scott Managing Partner Scott & Scott, LLP www.ScottandScottllp.com.

Slides:



Advertisements
Similar presentations
© 2008 Oracle Corporation – Proprietary and Confidential.
Advertisements

Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
University of Minnesota
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
THE ROLE OF INSURANCE REQUIREMENTS WITHIN AN ORGANIZATION By Aaron Hardiman, MBA, ARM.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Travelers CyberRisk for Insurance Companies
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Recent Trends and Insurance Considerations March 2015
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
2 September 2015 Building Scalable Insurance Programs For Each Growth Stage of a Entrepreneurial Company.
AUGUST 25, 2015 Cyber Insurance:
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
The Cloud and the Law Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
AIG Passport SM for Directors & Officers Liability Insurance Presented by: Hano Pak, AIG March 29, 2007.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Hot Topics in Technology Transactions Presented by: Robert J. Scott
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Technology and Media Law
Financial Institutions – Cyber Risk
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
E&O Risk Management: Meeting the Challenge of Change
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Cyber Issues Facing Medical Practice Managers
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cyber Exposures The Importance of Risk Identification and Transfer
The Health Insurance Portability and Accountability Act
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Hot Topics in Privacy & Security Law Presented by Robert J. Scott Managing Partner Scott & Scott, LLP

Hot Topics in Privacy & Security Law Overview Federal and State Statutory and Regulatory Issues HIPAA Privacy and Security Rules – 2009 Recovery Act extends HIPPA reach to business associates GLBA Safeguards Rules Data breach notification laws Data protection and destruction laws Civil Liability Unfair Trade Practice Claims Negligence Breach of Contract Unlawful Trade Practices Claim Scenarios TJX Radio Shack BJs Wholesale Club Choice Point DSW Heartland Hannaford Bros

State Data Breach Notification Laws

Network Security and Privacy Injury Claims FTC Investigations State Investigations Privacy Causes of Action Mitigation Strategies

State Investigations State Consumer Protection Laws Breach Notification Violations Violations for Failure to Protect and Properly Destroy Customer Data

Breach of Contract Claims Third-Party Beneficiary Claims Contractual and Non-Contractual Indemnity Claims Tort / Negligence Claims Failure to Maintain Adequate Security Negligent Retention of Data Negligent Misrepresentation Regarding Breaches in Security Private Causes of Action

Contact Information Robert J. Scott, Esq. Managing Partner Scott & Scott, LLP Ross Avenue, Suite 5000 Dallas, Texas Phone: (800) Fax: (800) Hot Topics in Privacy & Security Law

8 HOT TOPICS IN PRIVACY AND SECURITY LAW April 7, 2010 Rachel Simon Regional Underwriting Manager Dallas & Houston Regions

9 Key Areas of Exposure Financial Account Information Credit card data Bank account and PIN information Protected Healthcare Information Benefit Information Employee Health Information Personally Identifiable Information (PII) of Customers, Constituents, Clients, Employees Social Security Numbers Drivers License Information Addresses Medical Records Confidential Corporate Information Public Infrastructure

10 Network and Privacy Threats Unauthorized Access/Unauthorized Use Virus/Malicious Code Theft or Destruction of Confidential Corporate Information Theft or Exposure of Personal Identifying Information Theft or Exposure of Protected Health Information Cyber Extortion

11 Data Breach and ID Theft Impacts Bad press/Reputational damage Unbudgeted expenses Dissatisfied customers and employees Loss of customers/employees Regulatory investigations Lawsuits Lost Business/Revenue Damage to Balance Sheet

Exposure Trends… 285 Million records were breached in 2008, which is more than the previous four years combined 87% of breaches were considered avoidable through simple or intermediate controls 67% of breaches were aided by significant error 91% of all compromised records were linked to organized crime

13 "It's impossible to create an environment where you cannot have a data breach institute findings: The average cost of a breach: $6.75M dollars, up from 2008 and 2007 The average per record cost of a data breach is $204, up from 2008 and 2007 Errors of Third Parties (information holders) make up 42% of all breaches - Larry Ponemon of the Ponemon Institute

14 Risk Management Questions Do You have physical and system access controls in place? Do You have documented procedures for firewall, intrusion prevention, anti-virus, patch management? Do You have encryption tools to ensure integrity and confidentiality of sensitive data including data on removable media? Do You have a program in place to periodically test security controls? Does Your hiring process include the following: criminal, credit, references, drug screening?

15 Risk Management Questions Do You implement policies and procedures to ensure compliance with legislative, regulatory and/or contractual privacy requirements that govern your industry? Have You assigned the responsibility for Information Security & Privacy to a senior manager? Do You have an entity-wide Information Security & Privacy Policy and an Information Security Incident Response Plan in place?

16 Risk Management Questions Do Your contracts require defense and indemnification? Do Your contracts require vendors to maintain adequate security of information? Do You require vendors to maintain security and privacy insurance?

17 What Coverage is Available? Traditional insurance products do not respond: (GL, property, crime, D&O, E&O) Security and privacy coverage (sometimes called cyber liability) responds to: Failures of Network Security Privacy Events 3 rd and 1st Party losses should be covered

18 Security & Privacy Liability Coverage Policy responds to security failures and privacy events –Computer attack against an insured –Wrongful disclosure or breach of private or confidential data, including corporate data Security and Privacy Liability (3 rd party) Event Management (1 st party) Information Asset (1 st party) Network Interruption (1 st party) Cyber Extortion (1 st party)

Insurance Considerations Limits and retentions – Entity size – Industry – Risk appetite Comparing policy language Comparing carrier advantages – Professional experience: underwriters, claims staff, defense counsel Securing choice of counsel 19

20 Questions

21 Chartis is the marketing name for the worldwide property-casualty and general insurance operations of Chartis Inc. For additional information, please visit our website at All products are written by insurance company subsidiaries or affiliates of Chartis Inc. Coverage may not be available in all jurisdictions and is subject to actual policy language. Non-insurance products and services may be provided by independent third parties. Certain coverage may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds and insureds are therefore not protected by such funds. The data contained in this presentation are for general informational purposes only. The advice of a professional insurance broker and counsel should always be obtained before purchasing any insurance product or service. The information contained herein has been compiled from sources believed to be reliable. No warranty, guarantee, or representation, either expressed or implied, is made as to the correctness or sufficiency of any representation contained herein. The claim scenarios summarized herein are offered only as examples. Coverage depends on the actual facts of each case and the terms, conditions and exclusions of each individual policy. Anyone interested in the above product(s) should request a copy of the policy itself for a description of the scope and limitations of coverage. Chartis is the marketing name for the worldwide property-casualty and general insurance operations of Chartis Inc. All products are written by insurance company subsidiaries or affiliates of Chartis Inc. Coverage may not be available in all jurisdictions and is subject to actual policy language. Non-insurance products and services may be provided by independent third parties. Certain coverage may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds and insureds are therefore not protected by such funds. © Chartis Inc. All rights reserved.