INTERNET LIABILITY Internet Liability Richard Batchelder Corporate Underwriting American Re-Insurance Company 1234.

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
There are different threats and impacts that affect an organisation. Threats are things that the organisation will get attacked by so for example viruses.
Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Legal and Ethical Issues: Privacy and Security Chapter Five.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Electronic Commerce Systems
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Securing Information Systems
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 2-1 Lecture Outline 9 1. Using Information Systems for Competitive Advantage (p )
Definition: The value of property determined by tax officials. Assessed Valuation.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Chapter 7: E-Commerce Security and Payment system
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
Internet Risk Kevin Rooney General Reinsurance
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
IB Business Management
. E-Business Risk and Insurance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
ELECTRONIC MARKETING Pavel Kotyza, BA_EM Oct. 1, 2013.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
1 Chapter 7 E-Commerce The Internet, Intranets, and Extranets.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Safe’n’Sec IT security solutions for enterprises of any size.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Liability Insurance for an unsecure world
Securing Information Systems
Securing Information Systems
E&O Risk Management: Meeting the Challenge of Change
Learn how to protect yourself against common attacks
IT Security  .
Chapter 11 crime and security in the networked economy
Securing Information Systems
Cyber Insurance Overview
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Cyber Exposures The Importance of Risk Identification and Transfer
Forensic and Investigative Accounting
Presentation transcript:

INTERNET LIABILITY Internet Liability Richard Batchelder Corporate Underwriting American Re-Insurance Company 1234

INTERNET LIABILITY  Introduction  Risk and Exposure  Claims Examples  Underwriting Considerations Agenda >>

Introduction

INTERNET LIABILITY Definition of Insurance Terms “Internet Risk” “Cyber Liability” “E-Business” “E-Commerce” ? ? ? ?

INTERNET LIABILITY Introduction Definition of E-Commerce: –Applications using electronic data networks (Internet) for handling business processes and supporting these kinds of processes. –Trading activities via the Internet (e.g. buyer visits web site of seller in order to carry out any kind of business activities). >>

INTERNET LIABILITY Increase of Internet users world-wide (in millions)

INTERNET LIABILITY Growth of e-commerce world-wide (in billions)

Risk and Exposure

INTERNET LIABILITY Classification of Internet Sites –Static Sites –Interactive Sites (collection of information) –E-Commerce Sites –Use of advertising –Use of “cookies” –Use of “spyware” >>

INTERNET LIABILITY E-commerce matrix BusinessConsumer Business B2B B2C Consumer P2P

INTERNET LIABILITY Risk Assessment Technical Assessment– Company Info – Internet Presence – Management – IT Security – Internet Security Loss Potential Evaluation– Disruption Risk – Security Risk – Media Risk >>

INTERNET LIABILITY Risk and Loss Potential  Disruption Risk  Security Risk  Media Risk

INTERNET LIABILITY Disruption Risk  No connection to the Internet / to the user  Delayed or no access to data CAUSINGCAUSING  Loss of profit  Loss of online data  Damage to data  Loss of profit  Damage to stored data  System overload / Breakdown  Functional breakdown caused by wrong, outdated or faulty software  Loss of profit  Loss of advertising income  Standstill cost  Loss of data  Damage to data

INTERNET LIABILITY Exposure Examples Disruption Risk –Power outage –Hacker/Cracker attacks –Theft of data –Malicious Code (Viruses) –Denial of Service Attacks (DOS Attacks) –Distributed Denial of Service Attacks (DDOS Attacks by Zombies) >>

INTERNET LIABILITY Security Risk  Unauthorized access  Piracy CAUSINGCAUSING  Damage to stored data  Loss / manipulation of transmitted data  System breakdown  Restoration cost  Infringement of privacy  Loss of confidentiality and confidential data  Economic loss  Harmful actions (manipulation of data, dissemination of harmful material)  Risk of identification and authenticity of transaction partners (e.g. phishing)  Infringement of privacy  Loss / manipulation of transmitted data  Loss of confidential data

INTERNET LIABILITY Exposure Examples Security Risk –Hacker / Cracker –External –Internal –Malicious Code (Viruses, Trojan horses, Worms, Java applets) –Piracy –Phishing –Spyware >>

INTERNET LIABILITY – Spread of “Code Red” (within 24 hours) Demonstration of Virus Spread

INTERNET LIABILITY Media Risk CAUSINGCAUSING Danger of facing:  Warning notices  Inhibitory actions  Interim injunctions  Economic Loss Infringement of:  Right to privacy e.g. defamation  Trademarks e.g. domain names, logos  Unfair competition e.g. appropriation of IP address / URL  Patents e.g. unauthorized use of a business process  Copyrights e.g. downloading, storing, changing and displaying of otherwise protected content

INTERNET LIABILITY Exposure Examples Media Risk –Defamation, Libel and Slander; –Domain Names, Meta-Tags, Trademark, Framing and Linking; –Storage, manipulation, distribution of protected content

Claims Examples

INTERNET LIABILITY Potential Liability –“classic” liability risk - especially arising from: –general liability (coverage B) –professional liability –“new” liability risks - especially arising from: –interruption risk –security risk –media risk >>

INTERNET LIABILITY Basis of Liability –Interruption and security risk: –contractual liability (assessment necessary because of legal uncertainties) –liability for BI and PD as well as for pure financial losses (definition of data?) Amercian Guarantee & Liability Ins. v. Ingram Micro Inc.: Court held that defendant’s loss of use and functionality of its computers as a result of a power outage constitutes “direct physical loss or damage” within the meaning of a property insurance.... >>

INTERNET LIABILITY Basis of Liability >> –Media risk: –rapid distribution of information (“one click - one spread”) –specific regulation for each country (trademark / patent / copyright) –own content / content of third parties (framing / linking / deep linking)

INTERNET LIABILITY Example: Linking / Framing Disputes Linking / Framing Disputes –Linking: allows a Web surfer to click on an icon and instantly jump to another Web site. –“Deep Linking”: takes surfers deep within a second site, bypassing advertising or pertinent information contained on the front pages of the linked Web site. >>

INTERNET LIABILITY Example: Linking / Framing Disputes Microsoft established a link from its online “City Guides” pages to the ticket purchase area of the Ticketmaster Web site rather than to Ticketmaster`s homepage. The link allowed Web surfers to bypass many pages of advertising and promotional material. Ticketmaster argued that Microsoft was “usurping” its trade name and that this “deep linking” was tantamount to stealing content. Microsoft argued that linking is simply a part of the culture of the Internet. In January 1999 the parties settled the case, as Microsoft agreed to link the users to Ticketmaster`s homepage. »Ticketmaster v Microsoft: >>

INTERNET LIABILITY Liability of Internet Users – Examples of Losses –Online Bank –Internet Book Store >>

INTERNET LIABILITY Online Bank –An Online Bank also offered their customers the possibility to trade their stocks online. –The advertised accessibility: “24 hours/day – 365 days/year” –Due to a “DDoS Attack” the servers went down and also the backup system did not work for several hours. The customers could place their orders, however they were processed after reinstallation of the systems. –Customers suffered financial losses on “both sides” (buyers & sellers). Buyers (without having set limits) had to buy at a higher stock price if the stock market value had increased, while some sellers had to sell at a lower level due to a decrease in their portfolio value. –Claim was settled out of court. >>

INTERNET LIABILITY Internet Bookstore March Large US Internet Bookstore Loses Client Data To Hacker –An Internet bookstore announced that hackers had stolen data, including credit card information of 98,000 customers of its Bibliofind.com subsidiary. –Hackers have had access to customer data from October 2000 through February –Fortunately no indication that credit cards had been misused, but to prevent customer data from being compromised in the future, the company removed all customer credit card numbers, physical addresses, and phone numbers from its servers. –No claims as culprits were hackers (not crackers). >>

Underwriting Considerations

INTERNET LIABILITY Underwriting Considerations  Underwriting Challenges  Risk Assessment  Summary >>

INTERNET LIABILITY –Fast changes (technical standards, environment...) –Lack of statistical data –Uncertain legal environment –Definition of target clients –Definition of level of risk assessment –Questionnaires –Classification tools –Individual legal & technical risk assessment –Definition of suitable rating tools in accordance to the risk insured Underwriting Challenges >>

INTERNET LIABILITY Underwriting Consequences –Definition of target clients –Definition of level of risk assessment –Questionnaires –Classification tools –Individual legal & technical risk assessment –Definition of suitable rating tools in accordance to the risk insured >>

INTERNET LIABILITY Risk Assessment Claims Management (Claims Dept. Insured, Specialized Lawyers) Technical Risk Assessment (Specialized IT-Companies) Examination of Standard Terms and Conditions and Individual Contracts (Specialized Lawyers)

INTERNET LIABILITY Summary –What is the company goal in providing Internet coverage? –Gap Coverage –Coverage for Internet-intensive clients –Evaluate increased GL Coverage B exposure –Evaluate Professional Liability exposure –Evaluate potential damage to data exposure for aggregate accumulation (Liability and Property) –Patent Infringement Coverage >>

Thank you for your interest Richard Batchelder Corporate Underwriting American Re-Insurance Company 1234