Would Your Company s Insurance Cover a Cyberattack? 1
|
|
- Dale Berry
- 6 years ago
- Views:
Transcription
1 ABA Section of Litigation 2012 Insurance Coverage Litigation Committee CLE Seminar, March 1-3, 2012: Insurance coverage for data breaches, denial of service attacks, and cybersecurity events Would Your Company s Insurance Cover a Cyberattack? 1 Scott Godes, Esq. Dickstein Shapiro LLP Washington, DC On October 27, 2011, CNN.com posted 2 : A massive cyberattack that led to a vulnerability in RSA s SecurID tags earlier this year also victimized Google, Facebook, Microsoft and many other big-named companies, according to a new analysis released this week. The Krebs On Security blog posted 3 : Security experts have said that RSA wasn t the only corporation victimized in the attack, and that dozens of other multinational 1 This piece was posted originally on the Corporate Insurance Blog ( 2 David Goldman, Massive Hack Hit 760 Companies, CNN (Oct. 28, 2011) 3 Brian Krebs, Who Else Was Hit by the RSA Attackers?, Krebs on Security (Oct. 24, 2011) DSMDB-# v1 1
2 companies were infiltrated using many of the same tools and Internet infrastructure. This is in line with comments from others, including this quote from Digital Forensic Investigator News, that 2011 has quickly become the year of the cyber attack. 4 Would your insurance policies cover those events? Beyond the denial of service attacks that made news headlines, a shocking 80 percent of respondents in a survey of 200 IT security execs have faced large scale denial of service attacks, according to a ZDNet story. 5 These attacks and threats do not appear to be on a downward trend. They continue to be in the news after cyberattacks allegedly took place against U.S. government Web sites including those of the White House and the State Department over the July 4, 2009 holiday weekend. 6 The alleged attacks were not only against government sites; they allegedly included, according to a cyber-security specialist who has been tracking the incidents,... those run by the New York Stock Exchange, Nasdaq, The Washington Post, Amazon.com and MarketWatch. 7 The more recent ZDNet survey shows that a quarter of respondents faced denial of service attacks on a weekly or even daily basis, with cyberextortion threats being made as well. 8 Denial of Service Attacks The cyberattacks that have stolen recent headlines were denial of service incidents. Personnel from CERT Program, which is part of the federally funded Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania, have explained: Denial of service attacks come in a variety of forms and aim at a variety of services. There are three basic types of attack: consumption of scarce, limited, or non-renewable resources destruction or alteration of configuration information physical destruction or alteration of network components. 9 Some attacks are comparable to tak[ing] an ax to a piece of hardware and are known as socalled permanent denial-of-service (PDOS) attack[s]. 10 If a system suffers such an attack, which 4 Garry Byers, Rapid Cyber Attack Response: Three Days Make All the Difference (Sept. 28, 2011) 5 Larry Dignan, Cyberattacks on Critical Infrastructure Intensify, ZDNet, (Apr. 19, 2011). 6 U.S. Government Sites Among Those Hit by Cyberattack, CNN, (July 8, 2009). 7 Siobhan Gorman & Evan Ramstad, Cyber Blitz Hits U.S., Korea, Wall St. J., (July 9, 2009). 8 Larry Dignan, Cyberattacks on Critical Infrastructure Intensify, ZDNet, (Apr. 19, 2011). 9 CERT, Denial of Service Attacks, (last visited December 8, 2011); CERT, About CERT, (last visited Dec. 8, 2011). DSMDB-# v1 2
3 also has been called pure hardware sabotage, it requires replacement or reinstallation of hardware. 11 What Insurance Coverage Might Apply? The first place to look for insurance coverage for a denial of service attack is a cybersecurity policy. The market for cybersecurity policies has been called the Wild West of insurance marketplaces. Cyber security and data breach policies, certain forms of which may be known as Network Risk, Cyber-Liability, Privacy and Security, or Media Liability insurance, are relatively new to the marketplace and are ever-changing. The Insurance Services Office, Inc., which designs and seeks regulatory approval for many insurance policy forms and language, has a standard insurance form called the Internet Liability and Network Protection Policy, and insurance companies may base their coverages on this basic insuring agreement, or they may provide their own company-worded policy form. Because of the variety of coverages being offered, a careful review of the policy form before a claim hits is critical to understand whether the cyberpolicy will provide coverage, and, if it will, how much coverage is available for the event. If your company does make a claim under a cyberpolicy, engaging experienced coverage counsel who is familiar with coverage for cybersecurity claims will help get the claim covered properly and fight an insurance company s attempt to deny the claim or otherwise improperly try to limit coverage that is due under the policy. If your company faces a denial of service cyberattack and suffers losses as a result, but your company has not purchased a specialized suite of policies marketed as cyber security policies, coverage nonetheless may be available under other insurance policies. In addition, other insurance policies may provide coverage that overlaps with a cyberinsurance policy. Consider whether first party all risk or property coverage may apply. First party all risk policies typically provide coverage for the policyholder s losses due to property damage. If the denial of service cyberattack caused physical damage to your company s servers or hard drives, your company s first party all risk insurer should not have a credible argument that there was no property damage. Even if the damage is limited to data and software, however, it may be argued that the loss is covered under your company s first party all risk policy, as some courts have found that damage to data and software consists of property damage. 12 First party policies may also provide coverage for extra expense, business interruption, and contingent business interruption losses due to a cyberattack. (Contingent business interruption 10 Kelly Jackson Higgins, Permanent Denial-of-Service Attack Sabotages Hardware, Security Dark Reading, (May 19, 2008). 11 Id. 12 See, e.g., Lambrecht & Assocs., Inc. v. State Farm Lloyds, 119 S.W.3d 16 (Tex. App. 2003) (first party property coverage for data damaged because of hacker attack or computer virus); Am. Guar. & Liab. Ins. Co. v. Ingram Micro, Inc., No TUC ACM, 2000 U.S. Dist. LEXIS 7299, at *6 (D. Ariz. Apr. 18, 2000) (construing physical damage beyond harm of computer circuitry to encompass loss of access, loss of use, and loss of functionality ). DSMDB-# v1 3
4 losses may include losses that the policyholder faces arising out of a cyber security-based business interruption of another party, such as a cloud provider, network host, or others.) 13 Look also to other first party coverages, such as crime and fidelity policies, to determine whether there may be coverage for losses due to a cyberattack. In particular, crime policies may have endorsements, such as computer fraud endorsements, that may cover losses from a denial of service cyberattack. 14 If, after a cyberattack, third parties seek to hold your company responsible for their alleged losses, consider whether your company s liability policies would provide coverage. More importantly, consider your company s commercial general liability (CGL) insurance policy, if your company does not have a specialized cyber liability policy. If your company did buy a cyberinsurance policy, there is coverage under a CGL policy (and others) that may overlap the coverage in a cyberinsurance policy, providing your company with additional limits of insurance coverage available for the claim. The first coverage provided in a standard-form CGL insurance policy covers liability for property damage. Similar to the analysis above for first party all risk policies, if there was damage to servers or hard drives, insurers should not be heard to argue that there was no property damage. Courts are divided as to whether damage to data or software alone consists of property damage under insurance policies, with some courts recognizing that the computer data in question was physical, had an actual physical location, occupied space and was capable of being physically damaged and destroyed and that such lost data was covered under a CGL policy. 15 Be aware, however, that the insurance industry has revised many CGL policies to include definitions giving insurers stronger arguments that damage to data and software will not be considered property damage. But also note that your company s CGL policy may have endorsements that provide coverage specifically for damage to data and software. 16 Consider further whether a claim would fall within the property damage coverage for loss of use of tangible property loss of use of servers and hard drives because of the cyberattack; loss of use of computers arising out of alleged software and data-based causes has been held sufficient to trigger a CGL policy s property damage coverage. See Eyeblaster, Inc. v. Fed. Ins. Co., 613 F.3d 797 (8th Cir. 2010). 13 Se. Mental Health Ctr., Inc. v. Pac. Ins. Co., 439 F. Supp. 2d 831, (W.D. Tenn. 2006) (finding coverage under business interruption policy for computer corruption); see also Scott N. Godes, Ensuring Contingent Business Interruption Coverage, Law360 (Apr. 8, 2009), (discussing coverage under first party policies resulting from third party interruptions). 14 For example, in Retail Ventures, Inc. v. National Union Fire Insurance Co., No , slip op. (S.D. Ohio Mar. 30, 2009), the court held that a crime policy provided coverage for a data breach and hacking attack. 15 See, e.g., Computer Corner, Inc. v. Fireman s Fund Ins. Co., 46 P.3d 1264, 1266 (N.M. Ct. App. 2002). 16 See, e.g., Claire Wilkinson, Is Your Company Prepared for a Data Breach?, Ins. Info. Inst., at 20 (Mar. 2006), (discussing the Insurance Services Office, Inc. s endorsement for electronic data liability ). DSMDB-# v1 4
5 Keep in mind that if there is a claim for property damage under a CGL policy, there may be coverage for obligations that your company has under indemnity agreements. Standard form CGL policies provide coverage for indemnity agreements. 17 Depending on the types of claims asserted, other liability policies may be triggered as well. For example, directors and officers liability policies may provide coverage for investigation costs, 18 and errors and omissions policies also may cover, if the cybersecurity claims may be considered to be within the definition of wrongful act. 19 The takeaway for companies suffering from a cyberattack is that a careful review of all policies held by the insured is warranted to make certain that the most comprehensive coverage may be pursued. 17 See, e.g., Harsco Corp. v. Scottsdale Ins. Co., No. 49D PL , slip op. (Ind. Super. Ct. Apr. 26, 2011). 18 See MBIA Inc. v. Fed. Ins. Co., 652 F.3d 152, 160 (2d Cir. 2011). 19 See Eyeblaster, 613 F.3d at 804. DSMDB-# v1 5
Trends, Vendor Management, and Practical Tips For In House Counsel. ACC National Capital Region October 16, 2018
Cyberinsurance Issues Coming for 2019 Trends, Vendor Management, and Practical Tips For In House Counsel ACC National Capital Region October 16, 2018 Scott N. Godes Partner Insurance Recovery Co-Chair,
More informationCYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING
CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,
More informationCYBER-CRIMES: How Have Courts Dealt with the Insurance Implications of this Emerging Risk? By Alan Rutkin
CYBER-CRIMES: How Have Courts Dealt with the Insurance Implications of this Emerging Risk? By Alan Rutkin Insurance coverage law has one firm rule: when a new risk emerges, new coverage issues follow.
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationTHREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY
March 7, 2014 THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY In Zurich Amer. Ins. Co. v. Sony Corp., Index No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), the New York trial court held that Sony Corporation
More informationTrends in Cyber-Insurance Coverage to Meet Insureds Needs
Trends in Cyber-Insurance Coverage to Meet Insureds Needs Linda Wendell Hsu Selman Breitman LLP 33 New Montgomery Street, Sixth Floor San Francisco, CA 94105 (415) 979-0400 lhsu@selmanlaw.com William A.
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationFive Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims
Five Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims By Andrew M. Reidy, Joseph M. Saka and Ario Fazli Lowenstein Sandler Companies spend hundreds of millions of dollars annually to
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationCyber Liability Insurance. Data Security, Privacy and Multimedia Protection
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationCYBER POLICIES THE NEXT WAVE. ABA Insurance Coverage Litigation Committee CLE Seminar Tucson, Arizona March 1, 2018
CYBER POLICIES THE NEXT WAVE ABA Insurance Coverage Litigation Committee CLE Seminar Tucson, Arizona March 1, 2018 Karin S. Aldama Perkins Coie LLP 2901 N. Central Avenue, Suite 2000 Phoenix, AZ 85012-2788
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationLITTLE FISH, BIG PONZI: RECOUPING MADOFF LOSSES THROUGH INSURANCE PROCEEDS
For More Information: Rachel S. Kronowitz Ellen Katkin 202.772.2273 202.772.1960 kronowitzr@gotofirm.com katkine@gotofirm.com February 2009, No. 4 LITTLE FISH, BIG PONZI: RECOUPING MADOFF LOSSES THROUGH
More informationRecent Developments in Construction Coverage
Recent Developments in Construction Coverage R. Brent Cooper Cooper & Scully, P.C. 900 Jackson Street, Suite 100 Dallas, TX 75202 Telephone: 214-712-9501 Email: brent.cooper@cooperscully.com 2016 This
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationIs Turnabout Fair Play? Insurers Seek Privileged Work Product From Policyholders Asserting Bad Faith Claims
Is Turnabout Fair Play? Insurers Seek Privileged Work Product From Policyholders Asserting Bad Faith Claims By: Kristi Singleton and Richard Gallena 1 Insurance Coverage Group The question of whether the
More informationKCMBA CLE June 19, I. What are an insurance company s duties to its insured?
KCMBA CLE June 19, 2018 Third-Party Bad Faith I. What are an insurance company s duties to its insured? II. III. If you are attempting to settle a case with an insurance company, how should your settlement
More informationDoes it pay to be cyber-insured
Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks Key issues Where do insurance
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationSmall business, big risk: Lack of cyber insurance is a serious threat
Small business, big risk: Lack of cyber insurance is a serious threat October 2018 Sean Kevelighan Chief Executive Officer seank@iii.org James Lynch, FCAS, MAAA Chief Actuary jamesl@iii.org Jessica McGregor
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationCyber and Business Interruption Risks: Connectivity Adds Complexity
Cyber and Business Interruption Risks: Connectivity Adds Complexity 1 North American Cyber and Business Interruption Risks: Connectivity Adds Complexity Interconnectivity has always presented opportunities
More informationOECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE April 2016 Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent
More informationAPPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London
APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear
More informationIN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT
Case: 15-20522 Document: 00513778783 Page: 1 Date Filed: 11/30/2016 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT VADA DE JONGH, Plaintiff Appellant, United States Court of Appeals Fifth
More informationCYBERINSURANCE TRENDS AND DEVELOPMENTS
CYBERINSURANCE TRENDS AND DEVELOPMENTS What cyber risks can be covered Emerging products Recent cases, pending legislation and regulation Claims case studies INTRODUCTION TO CYBERINSURANCE Gartner defines
More informationManaging E-Commerce Risks
Managing E-Commerce Risks, Chartered Insurer ACII (UK), CPCU (USA), ARe (USA), ARM (USA), FIII (India). MBA Email: manoj@einsuranceprofessional.com E-Commerce and Risk Management E-Commerce is the delivery
More informationLargest Risk for Public Pension Plans (Other Than Funding) Cybersecurity
Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only
More informationDepartment of Labor Reverses Course: Mortgage Loan Officers Do Not Meet the Administrative Exemption s Requirements
A Timely Analysis of Legal Developments A S A P In This Issue: March 2010 In a development that may have significant implications for mortgage lenders and other financial services employers, the Department
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationADDITIONAL INSURED COVERAGE
ADDITIONAL INSURED COVERAGE MAXIMIZING COVERAGE IN A POST-BURLINGTON WORLD JEFFREY J. VITA, ESQ. Saxe Doernberger & Vita, P.C. January 31, 2018 Additional Insured Coverage Maximizing Coverage in a Post-Burlington
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationSymposium. Insuring Against Cyber Risk: The Evolution of an Industry. Introduction. Christopher C. French*
Symposium Insuring Against Cyber Risk: The Evolution of an Industry Introduction Christopher C. French* Cyber risks are the newest risks of the 21st century. According to former FBI Director Robert Mueller,
More informationInvas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered?
Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered? Speakers : Edward M. Joyce, Partner, Jones Day Leslie Lamb, Director Global Risk Management, Cisco Systems, Inc. The views
More informationAmerican Bar Association Section of Litigation Insurance Coverage February 26, 2013
American Bar Association Section of Litigation Insurance Coverage February 26, 2013 Contingent Business Interruption Coverage for Superstorm Sandy Losses By Lon A. Berk and Michael S. Levine Superstorm
More informationInsurance Coverage for PATENT Disputes: A QUICK HIT. Presented By Caroline Spangenberg Kilpatrick Stockton LLP December 16, 2010
Insurance Coverage for PATENT Disputes: A QUICK HIT Presented By Caroline Spangenberg Kilpatrick Stockton LLP December 16, 2010 Overview Coverage Under Commercial General Liability Policies Advertising
More informationCyber Liability: New Exposures
Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders
More informationCyber Enhancement Endorsement
Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?
More informationYou ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationSTOWERS UPDATE HANDLING EARLY STOWERS DEMANDS
STOWERS UPDATE HANDLING EARLY STOWERS DEMANDS 25 th Annual Insurance Symposium April 6, 2018 R. Brent Cooper 2018 This paper and/or presentation provides information on general legal issues. It is not
More informationInsurance Coverage Law Update: The Recent Cases You Need to Know
Insurance Coverage Law Update: The Recent Cases You Need to Know October 13, 2016 Katherine J. Henry Kate Margolis J. Alex Purvis Bradley Arant Boult Cummings LLP Attorney-Client Privilege. Topics We Will
More informationExcess Insurer's Duty to Defend and Indemnify Strategies to Broaden or Limit the Scope of the Excess Insurer's Obligations
Presenting a live 90 minute webinar with interactive Q&A Excess Insurer's Duty to Defend and Indemnify Strategies to Broaden or Limit the Scope of the Excess Insurer's Obligations TUESDAY, DECEMBER 21,
More informationTarget Date Funds Platform Investment Options
Target Date Funds Platform Investment Options The Evolving Tension Between Property Rights and Union Access Rights The California Experience By: Ted Scott and Sara B. Kalis, Littler Mendelson Kim Zeldin,
More informationFM Global. First-Party Property Cyber Coverage
First-Party Property Cyber Coverage Introduction Cyber is Board of Directors level concern #1 issue for commercial insurance industry Everyone on steep learning curve Objective and Agenda Understand differences
More informationHartford Steam Boiler (HSB) data security products for Commercial Lines.
Hartford Steam Boiler (HSB) data security products for Commercial Lines. Nationwide, together with HSB, offers data security insurance products that address several key data security exposures: Identity
More informationCyber Liability A New Must Have Coverage for Your Soccer Organization
Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web
More informationMILTON PFEIFFER, Plaintiff, v. BJURMAN, BARRY & ASSOCIATES, and BJURMAN, BARRY MICRO CAP GROWTH FUND, Defendants. 03 Civ.
MILTON PFEIFFER, Plaintiff, v. BJURMAN, BARRY & ASSOCIATES, and BJURMAN, BARRY MICRO CAP GROWTH FUND, Defendants. 03 Civ. 9741 (DLC) UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK 2006
More informationIN THE SUPREME COURT OF TEXAS
IN THE SUPREME COURT OF TEXAS 444444444444 No. 06-0867 444444444444 PINE OAK BUILDERS, INC., PETITIONER, V. GREAT AMERICAN LLOYDS INSURANCE COMPANY, RESPONDENT 4444444444444444444444444444444444444444444444444444
More informationINSURANCE COVERAGE UPDATE Decisions
Presented for: INSURANCE COVERAGE UPDATE 2016 Top Ten Liability Insurance Coverage Decisions Presented by: Alan C. Eagle, Esq. May 20, 2016 Additional Insured: Backdrop AI coverage for liability arising
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationCredit Card Data Breaches: Protecting Your Company from the Hidden Surprises
Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationCase 9:16-cv BB Document 42 Entered on FLSD Docket 01/30/2017 Page 1 of 9 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
Case 9:16-cv-80987-BB Document 42 Entered on FLSD Docket 01/30/2017 Page 1 of 9 THE MARBELLA CONDOMINIUM ASSOCIATION, and NORMAN SLOANE, UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA v. Plaintiffs,
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More informationRECOVERING MORE INSURANCE FOR SEC AND INTERNAL INVESTIGATIONS
RECOVERING MORE INSURANCE FOR SEC AND INTERNAL INVESTIGATIONS By Mary Craig Calkins and Linda D. Kornfeld Recent decisions in the Office Depot, 1 MBIA, 2 and Gateway, Inc. 3 cases have refined the law
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationCyber Insurance 2017:
Cyber Insurance 2017: Ensuring Your Coverage is Sound Thursday, March 23, 2017 Attorney Advertising Prior results do not guarantee a similar outcome 777 East Wisconsin Avenue, Milwaukee, WI 53202 414.271.2400
More informationInsurance Bad Faith MEALEY S LITIGATION REPORT. A commentary article reprinted from the November 24, 2010 issue of Mealey s Litigation Report:
MEALEY S LITIGATION REPORT Insurance Bad Faith Pitfalls For The Unwary: The Use Of Releases To Preserve Or Extinguish Any Potential Bad-Faith Claims Between The Primary And Excess Insurance Carriers by
More informationWHAT DOES IT MEAN TO EXHAUST AN UNDERLYING LAYER OF INSURANCE?
WHAT DOES IT MEAN TO EXHAUST AN UNDERLYING LAYER OF INSURANCE? By Robert M. Hall Mr. Hall is an attorney, a former law firm partner, a former insurance and reinsurance executive and acts as an insurance
More informationInsurer's Duty to Defend: Resolving Cost Issues Strategies for Defense Cost Reimbursement and Allocation
presents Insurer's Duty to Defend: Resolving Cost Issues Strategies for Defense Cost Reimbursement and Allocation A Live 90-Minute Teleconference/Webinar with Interactive Q&A Today's panel features: Jared
More informationProperty business interruption Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationDFARS Cyber Compliance And Potential For FCA Risk
DFARS Cyber Compliance And Potential For FCA Risk December 18, 2017 By Colleen Brown, Robert Conlan and Christopher Fonzone For well over a year, defense contractors have had New Year s Eve 2017 circled
More informationSurprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their
When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises
More informationCase study. Malware mayhem. A targeted ransomware attack on a technology provider opens up a can of worms
Case study Malware mayhem A targeted ransomware attack on a technology provider opens up a can of worms Ransomware is one of the fastest growing forms of cybercrime in the world. According to our own claims
More informationADDRESSING MULTIPLE CLAIMS.
0022 [ST: 1] [ED: 10000] [REL: 2] Composed: Wed Oct 15 14:15:43 EDT 2008 IV. ADDRESSING MULTIPLE CLAIMS. 41.11 Consider Insurance Provisions as to Multiple Claims and Interrelated Wrongful Acts. 41.11[1]
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationSTATE OF MICHIGAN COURT OF APPEALS
STATE OF MICHIGAN COURT OF APPEALS MICHIGAN EDUCATIONAL EMPLOYEES MUTUAL INSURANCE COMPANY, UNPUBLISHED January 27, 2004 Plaintiff-Appellant, v No. 242967 Oakland Circuit Court EXECUTIVE RISK INDEMNITY,
More informationMEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT
MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT IOWA ACTUARIES CLUB 2/25/16 EDUCATION DAY PRESENTED BY KEITH BURKHARDT, V.P. KRAUS-ANDERSON INSURANCE Overview I. Why are cyber security
More informationForest Labs., Inc. v A rch Ins. Co.
Forest Labs., Inc. v A rch Ins. Co. 2012 NY Slip Op 22291 [38 Misc 3d 260] September 12, 2012 Schweitzer, J. Supreme Court, New York County Published by New York State Law Reporting Bureau pursuant to
More informationElectronic Commerce and Cyber Risk
Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing
More informationInsurance Tips For 'No Poach' Employment Antitrust Claims
Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Insurance Tips For 'No Poach' Employment
More informationTHE 24TH ANNUAL INSURANCE SYMPOSIUM: ALLOCATION & OTHER INSURANCE ROBERT J. WITMEYER & KATYA G. LONG
THE 24TH ANNUAL INSURANCE SYMPOSIUM: ALLOCATION & OTHER INSURANCE BY: ROBERT J. WITMEYER & KATYA G. LONG 2017 This paper and/or presentation provides information on general legal issues. It is not intended
More informationClaims Made Basis. Underwritten by Underwriters at Lloyd s, London
APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds
More informationTarron L. Gartner-Ilai Cooper & Scully, PC 900 Jackson Street Suite 200 Dallas, Texas (214)
Tarron L. Gartner-Ilai Cooper & Scully, PC 900 Jackson Street Suite 200 Dallas, Texas 75202 (214) 712-9570 Tarron.gartner@cooperscully.com 2018 This paper and/or presentation provides information on general
More informationCyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby
Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC
More informationJAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)
More informationIs the Cyber Exclusion the New Pollution Exclusion?
Is the Cyber Exclusion the New Pollution Exclusion? Presented by: Katherine Henry Brendan Hogan Bradley Arant Boult Cummings LLP Attorney-Client Privilege. Topics for Today s Presentation Pollution exclusion
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationInsurance Coverage for Rip & Tear Costs
Insurance Coverage for Rip & Tear Costs Robert J. Witmeyer Aaron G. Stendell 2019 This paper and/or presentation provides information on general legal issues. It is not intended to provide advice on any
More informationmg Doc 5698 Filed 11/12/13 Entered 11/12/13 21:50:13 Main Document Pg 1 of 9 ) ) ) ) ) ) ) Chapter 11 DIRECT TESTIMONY OF MARTIN BLUMENTRITT
12-12020-mg Doc 5698 Filed 11/12/13 Entered 11/12/13 21:50:13 Main Document Pg 1 of 9 UNITED STATES BANKRUPTCY COURT SOUTHERN DISTRICT OF NEW YORK In re: RESIDENTIAL CAPITAL, LLC, et al., Debtors. ) )
More informationTech and Cyber Claims Services
Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationIN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA MEMORANDUM
GROSSMAN v. METROPOLITAN LIFE INSURANCE CO., Doc. 21 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA JACK GROSSMAN, Plaintiff, CIVIL ACTION v. METROPOLITAN LIFE INSURANCE CO.,
More informationProperty business interruption (technology) Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationPRESENTERS. Jerry Hamilton - Managing Shareholder, Hamilton Miller et al. Chad Callaghan Principle, Premises. David Bender Shareholder, Anderson
CCTVS PRESENTERS Chad Callaghan Principle, Premises Liability Consultants Safety & Security Consultant to the American Hotel & Lodging Association serves on the Board of Directors for ASIS International
More informationProperty business interruption (charity and not for profit) Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationEmerging legal and regulatory risks
Emerging legal and regulatory risks Presentation for AusCERT2016 Matthew Pokarier and Ben Di Marco Structure Regulatory risks Third-party liability Actions by affected individuals Actions by banks and
More information3 Recent Insurance Cases That Defend The Duty To Defend
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com 3 Recent Insurance Cases That Defend The Duty To Defend
More informationSUMMARY: The Federal Trade Commission ( FTC or Commission ) requests public
[Billing Code: 6750-01S] FEDERAL TRADE COMMISSION 16 CFR Part 314 RIN 3084-AB35 Standards for Safeguarding Customer Information AGENCY: Federal Trade Commission. ACTION: Request for public comment. SUMMARY:
More informationGreater Effects of Hurricanes in Business Interruption Claims
Greater Effects of Hurricanes in Business Interruption Claims In the classic film Forrest Gump, after Forrest returned from the Vietnam War, he honored a wartime promise he had made to his deceased friend
More information