Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Presented at: Ctuit Software and Lathrop & Gage LLP Food & Hospitality Roundtable San Francisco, CA April 29, 2013 Presented by: Leib Dodell, Esq.
©2008 Perkins Coie LLP Game Industry Roundtable Privacy Developments for the Game Industry Thomas C. Bell September 24, 2008.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Law I Chapter 18.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presented by: Jamie Orye, JD, RPLU Beazley Group Pennsylvania Association of Mutual Insurance Companies Annual Spring Conference March 12, 2015.

September 14, 2011 Network Risk/Privacy Insurance Exposure and Coverage Issues.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
ICSA Professional Indemnity, Directors & Officers Insurance for Financial Institutions Magnus McGurk, Business Development Manager, SME Professional Lines.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
NEFEC - Cyber Liability MICHAEL GUZMAN, ARM ARTHUR J. GALLAGHER & CO.
Overview of Cybercrime
Leadership, Knowledge, Solutions…Worldwide. Privacy & Data Security Understanding Identity theft The art of managing a crisis Jim Leonard – Marsh FINPRO.
©2015, Amy Stewart PC Title Here Cyber Insurance: The Future is Now Texas Lawyer In-House Counsel Summit May 8, 2015 Texas Lawyer In-House Counsel Summit.
AUGUST 25, 2015 Cyber Insurance:
Cyber Risk Insurance. Some Statistics Privacy Rights Clearinghouse o From 2005 – February 19, 2013 = 607,118,029 records reported breached. Ponemon Institute.
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
. E-Business Risk and Insurance.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Cyber-insurance coverage: do you have it? Robert E. Sumner, IV, Esq. and Tosh Siao of Willis Group September 17, 2015.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
Cybercrime What is it, what does it cost, & how is it regulated?
Managing Your Cyber/E&O Risk with Willis FINEX Robert Barberi, Vice President, Willis Cyber Practice.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Network Security & Privacy Discussion Colorado Community Health Network April 14, 2014 Presented by: Kevin Keilbach – Client Executive – Health Care Jeff.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance - Risk Exposures and Strategic Solutions
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Camargue Commercial Crime
Breaking Down Cyber Liability
Financial Institutions – Cyber Risk
Financial Technology in Cyber Risks
Cyber Insurance presentation for: The 2nd Anti Cybercrime Forum Beirut, 29th November 2016 Alexander Blom, Head of Financial Lines, AIG MENA.
E&O Risk Management: Meeting the Challenge of Change
Managing a Cyber Event Steven P. Gibson President
Cyber Insurance – FFs & CHBs
What Business Owners Need to Know About Data Privacy
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Cyber Insurance: An Update on the Market’s Hottest Product
Society of Risk Management Consultants Annual Conference
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
FAIR 2018 – Cyber Risks & Markets
Cyber Exposures The Importance of Risk Identification and Transfer
Forensic and Investigative Accounting
Cyber Security: What the Head & Board Need to Know
Anatomy of a Common Cyber Attack
Presentation transcript:

Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

2  Goes by various names – “Information Security Insurance”, “Network Security Insurance”, “Privacy Insurance”, “Data Breach Insurance”, “Network Breach Insurance”, “Technology Solutions”, “Cyber Liability”, “Breach Response Insurance”…

3  General Liability Insurance doesn’t respond to cyber claims  Typical CGL policy defines “property damage” as “physical injury to tangible property, including all resulting loss of use of that property.  Some CGL policy forms specifically exclude electronic data from their definition of “property damage.” In such policies, “electronic data” is generally defined as the “information, facts or programs stored as or on, created or used on, or transmitted to or from computer software.”  Data, web pages and computer systems do not constitute tangible property because they are not capable of being touched, held or sensed by the human mind. 3

4  In the event of a data breach:  Notify Employees  Notify members of public  Notify regulators State/Multi State Federal Additional efforts Who has to do this?

5 Responsibility lies with the offending entity

6  Not just insurance coverage  Claims for damages by third parties  A variety of services  Designed to prevent claims  Respond on your behalf  Deal with regulators  Make sure you comply Handle Public Relations Takes the burden off of you

7  Cyber claims are infrequent but they do occur  Big name companies are targets but you represent low hanging fruit  Lack of formal security and “Privacy Policies”  What if it happens to you?  Will you know what to do?

8  If you pass along a virus or other type of malware, even unknowingly, especially if another entity's customer information is then compromised.

9  If an employee gains unauthorized access to another entity's information or if confidential information is disclosed or misused.

10  If an employee knowingly or unwittingly slanders another entity in a blog, , or in a social media or forum post, or infringes on copyrighted material.

11  If you do not follow federal or state regulations controlling notification of members of the public/employees whose personal data has been compromised.

12  Breach occurs when an unauthorized 3rd party accesses your network or the network becomes infected with a virus or a denial of service attack.

13  Data can be stolen that can help criminals access PII*.  PII is a legal concept, not a technical concept.  PII can be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts.stalksteal the identity  PII has become much more important as information technology and the Internet have made it easier to collect PII through breaches of internet security, network security and web browser security, leading to a profitable market in collecting and reselling PII.information technologyInternetinternet securitynetwork securitybrowser security *Personally Identifiable Information

14 And who pays for it?

15 Ghost Busters?

16 Immediately dial the XL Data Breach Hotline This is EXTREMELY IMPORTANT! Keep the number handy!

17 Nelson, Levine, deLuca, & Hamilton They will guide you.

18 Or contact Qual-Lynx.

19 Data Recovery ◦ Expenses required to replace, recreate, restore or repair the Insured’s network or information residing on the network to substantially the form in which it existed immediately prior to a breach.

20 Cyber Extortion  Coverage provided to reimburse an Insured the amounts paid to avert a credible threat to commit or continue a network attack against the insured or to disclose personally identifiable information

21 Data Breach Response Costs PCI-DSS Response Reimburse the Insured for the costs incurred following a breach of private information. Typically costs are provided on a sub-limited basis. Reimburse the Insured for the costs in incurs to respond to a PCI-DSS incident. Forensics costs Public relations costs Legal Mandatory notification costs Voluntary notification costs Credit monitoring Call center Breach coach costs Independent forensic investigation conducted by a Payment Card Industry Forensic Investigator (PFI); Attorney fees fines and penalties owed by the Insured under the terms of a Merchant Services Agreement Fees..

22 Data Breach Response Costs PCI-DSS Response Reimburse the Insured for the costs in incurs following a breach of private information. Typically costs are provided on a sublimited basis. Reimburse the Insured for the costs incurred to respond to a PCI-DSS incident. Forensics costs Public relations costs Legal Mandatory notification costs Voluntary notification costs Credit monitoring Call center Breach coach costs Independent forensic investigation conducted by a Payment Card Industry Forensic Investigator (PFI); Attorney fees fines and penalties owed by the Insured under the terms of a Merchant Services Agreement Fees..

23 Data Breach Response Costs PCI-DSS Response Reimburse the Insured for the costs incurred following a breach of private information. Typically costs are provided on a sub-limited basis. Reimburse the Insured for the costs incurred to respond to a PCI-DSS incident. Forensics costs Public relations costs Legal Mandatory notification costs Voluntary notification costs Credit monitoring Call center Breach coach costs Independent forensic investigation conducted by a Payment Card Industry Forensic Investigator (PFI); Attorney fees fines and penalties owed by the Insured under the terms of a Merchant Services Agreement Fees.

24 Network Security LiabilityPrivacy Liability Failure by the Insured to prevent a network breach which results in: 1.the inability of an authorized user to gain access to the network; 2.the alteration, addition to, copying, destruction, deletion, disclosure, damage or removal of any data residing on the network; 3.a denial of service attack against Internet sites or computers; 4.the transmission of a computer virus from the network to third- party networks or Internet sites; Coverage for claim arising from third parties for allegations of: 1.violation of privacy torts, law and regulations (GLB, HIPAA, COPPA) 2.theft, loss, unauthorized disclosure of personally identifiable information private information 3.alterations, corruption, destruction, deletion or damage to private information Includes both online and off-line data.

25 Network Security LiabilityPrivacy Liability Failure by the Insured to prevent a network breach which results in: 1.the inability of an authorized user to gain access to the network; 2.the alteration, addition to, copying, destruction, deletion, disclosure, damage or removal of any data residing on the network; 3.a denial of service attack against Internet sites or computers; 4.the transmission of a computer virus from the network to third- party networks or Internet sites; Coverage for claim arising from third parties for allegations of: 1.violation of privacy torts, law and regulations (GLB, HIPAA, COPPA) 2.theft, loss, unauthorized disclosure of personally identifiable information private information 3.alterations, corruption, destruction, deletion or damage to private information Includes both online and off-line data.

26 Network Security LiabilityPrivacy Liability Failure by the Insured to prevent a network breach which results in: 1.the inability of an authorized user to gain access to the network; 2.the alteration, addition to, copying, destruction, deletion, disclosure, damage or removal of any data residing on the network; 3.a denial of service attack against Internet sites or computers; 4.the transmission of a computer virus from the network to third- party networks or Internet sites; Coverage for claim arising from third parties for allegations of: 1.violation of privacy torts, law and regulations (GLB, HIPAA, COPPA) 2.theft, loss, unauthorized disclosure of personally identifiable information private information 3.alterations, corruption, destruction, deletion or damage to private information Includes both online and off-line data

27 Defense  Provides defense costs resulting from a regulatory investigation or proceeding. Typical enforcement comes from the FTC or AGs.  FTC can charge defendants with violating of Section 5 of the FTC Act, which bars unfair and deceptive acts and practices in or affecting commerce.  As of May 1, 2011, the FTC has brought 32 legal actions against organizations that have violated consumers’ privacy rights, or misled them by failing to maintain security for sensitive consumer information.

28  Covers the content the Insured disseminates through various means including social media for a defined list of covered perils.  Intellectual property infringement  Defamation  Other personal injury torts

29 Third Party Coverage :  Media Liability, Network Security and Privacy Liability  $1,000,000 per claim  $3,000,000 annual aggregate  $10,000 deductible each claim  Regulatory Fines and Penalties sub limit of $500,000  Retroactive date January 1, 2013

30 First Party Coverage:  Notification Costs, Extortion Threat, Crisis Management and Business Interruption  $500,000 per claim limit  $3,000,000 annual aggregate  $10,000 deductible each claim

31  Data Breach Hotline o o Service Provided by Nelson, Levin, deLuca & Horst  eRisk Hub ◦ Go to ◦ Complete Registration Form ◦ Access Code – ◦ Once Registered your have immediate access to the portal with User ID & password created during registration

32

33

34

35 Much More

Jim Prendergast Partner Nelson Levine de Luca & Hamilton After The Break… Cyber Liability Risk Management