Aon Risk Solutions Financial Services Group. Market Update. Cyber and privacy liability. June 2017

Size: px
Start display at page:

Download "Aon Risk Solutions Financial Services Group. Market Update. Cyber and privacy liability. June 2017"

Transcription

1 Aon Risk Solutions Market Update Cyber and privacy liability June 2017

2 Market Update The cyber and privacy liability market continued to have ample capacity through the fi rst half of There have been no new entrants into the Canadian cyber market, however, Beazley expanded their presence in Canada through the purchase of Creechruch Underwriters, a specialty managing general agent. When determining premiums, insurers continue to look to the number and type of records held by an organization, the scale of the business, and the extent to which records are outsourced to third party service providers. However, whether a company has an incident response plan, a business continuity plan and uses encryption are also key factors that will impact cyber insurance pricing. Clients should be aware that insurance forms available in the marketplace vary signifi cantly in the breadth and scope of coverage, which can result in signifi cant rate differences from carrier to carrier. High-risk sectors such as retail, universities, health care providers, municipalities, and ancillary services will generally command a higher rate than other sectors. Market Trends There is good market capacity for privacy risks available domestically, although coverage for more complex or individually tailored risks is generally underwritten through the London markets. There were a number of large scale data breaches in the retail sector over the last two years, resulting in hardening of the cyber insurance market for retailers in The insurance price adjustment due to those losses has now been made. Now cyber insurance rates and retentions are generally remaining flat on renewal for retailers, but carriers are implementing more stringent underwriting requirements. Insureds that process electronic credit card transactions are considered a higher risk sector and insurers are more often requiring insureds to be compliant with Payment Card Industry Data Security Standards (PCI-DSS). In fact, an insured may be refused coverage by some carriers where it is not compliant with PCI-DSS or may be subject to an exclusion for PCI-DSS fines and penalties (usually otherwise covered where an insured is PCI-DSS compliant). With fewer insurers writing retail risks, insurance can sometimes be diffi cult to procure for clients that are perceived to have a large payment card risk exposure. The market remains competitive with respect to other industries and cyber risks, with premiums and retentions generally remaining flat. Insureds that do not operate within an industry seen as high-risk have seen some decrease in pricing on renewal when the account is marketed. 2 State of the Market: Cyber and privacy liability

3 Coverage It is now standard and expected for cyber insurers to provide full-limits coverage for both fi rst and third-party expenses on cyber insurance policies. Insureds that have renewed in the fi rst half of 2017 have, for the most part, had existing sublimits removed for no additional premium. Most insurers will not provide fi rst-party expense coverage for a breach that occurs prior to the purchase of cyber insurance, even if it results in a claim after the policy is in place. However, some will provide backdated coverage for an additional premium for unknown cyber breaches (i.e. malware) that took place prior to the purchase of insurance. This will result in a claim once insurance is in place as long as no member of the organization s control group was aware of the breach or a pre-existing vulnerability that could have led to a breach. Some insurers underwriting cyber liability insurance are now providing insureds with emergency response costs coverage so that the insured can use approved vendors to mitigate losses in an emergency situation. When the insured cannot contact the insurer, this coverage provides immediate crises response coverage for the first 24 hours with a sublimit and no deductible. The internet of things (IoT) continues to be a significant cyber risk for businesses concerned with a potential cyber-breach causing injury to individuals or damage to property. Until recently, insurance coverage for these risks was piecemeal under property, casualty, and other developing insurance products. However, in late 2016, Aon launched a new insurance product, the Aon Cyber Enterprise Solution, to address property and casualty losses arising out of a cyber-breach specifically. The policy is designed to protect organizations against catastrophic cyber risk with a large limit and large retention approach. It is one of the first insurance products to clearly provide coverage for exposures such as cyber terrorism and property damage, products liability, and other major losses resulting from a network security breach. Other insurers have since introduced similar products, for example, American International Group s Cyber Edge. The market is also evolving to provide cheaper and more effi cient cyber insurance solutions for small- to mid-sized organizations. In 2016, Aon collaborated with Beazley Group (Beazley) to develop an insurance program designed specifi cally for small- to mid-sized organizations that can be applied for and purchased through an online platform. The new approach to purchasing this insurance streamlines the underwriting for this category of cyber risk and facilitates an easier and less-expensive cyber insurance purchase for these clients. The online tool is now ready to bind risks with revenue less than $200 billion. Only seven non-it related questions are required to obtain fi rm terms and the product provides full retroactive coverage. There s been a new trend for brokers to partner with risk management fi rms in order to bring complete cyber risk solutions. Aon has purchased a leading cyber security fi rm, creating a comprehensive Cyber Risk Management Advisory Group with distinct client value, including standards-based cyber assessments and industry-leading risk transfer solutions. Canadian Regulatory Update Cybersecurity is a priority in for Canadian Securities Administrators (CSA) The CSA have released Staff Notice (notice) on cybersecurity, which serves as an update to Staff Notice , previously released in September The notice reports on CSA s review of the filings of the 240 constituent issuers in the S&P/TSX Composite Index concerning their disclosure of cybersecurity issues. The review found the following: Only 61 percent of issuers addressed cyber security issues in their risk factor disclosure Few issuers provided disclosure regarding their particular vulnerability to cyber security incidents Aon Risk Solutions 3

4 Only 31 issuers identifi ed a person, group, or committee responsible for cybersecurity risk management Some issuers disclosed that a disaster recovery plan had been put in place, while few issuers disclosed holding insurance against cybersecurity incidents No issuer disclosed the occurrence of a material cybersecurity breach When preparing their disclosure, issuers should consider the reasons they may be exposed to a cyber security breach, the source and nature of the risks, the potential consequences of a cyber security breach, and the adequacy of preventative measures. Disclosure should focus on material and entity specific information and avoid boilerplate language as much as possible. It is expected that issuers tailor their disclosure of cyber security risk to their particular circumstances, without disclosing details regarding their cyber security strategy or their vulnerability to cyberattacks. The notice serves as a further indication that regulators are taking cybersecurity very seriously and market participants are expected to do the same. A cyber security roundtable took place on 27 February 2017 to discuss issues related to cyber security and opportunities for greater collaboration, communication, and coordination in the event of a cyber security incident. No information has been released on the discussions from the roundtable. The CSA is expected to continue reviewing disclosure of cyber security risks and incidents, monitor trends in disclosure, and review the extent and timing of reporting of cyber security incidents. IoT botnets present unmanageable cyber security risk Juniper Research Limited (Juniper), a UK based company, has cautioned that the scale of embedded connectivity could lead to an unmanageable cyber security risk created by botnets. Botnets are a network of private computers infected with malicious software and controlled as a group without the owners knowledge. Juniper estimates that the consumer IoT installed base will reach 15 billion-plus units by 2021, a 120 percent increase over 2016, leading to botnets in excess of one million units. Juniper s research found that using botnets to disrupt internet services will form part of the near-term threat landscape. While there have not yet been any direct regulatory adjustments to deal with the unique issues this risk presents, a review of existing Canadian laws may be desirable. In particular, Canada s current laws around consent and personally identifi able information may need to be reviewed or updated. In the meantime, IoT device manufacturers should take a proactive approach by implementing security-by-design. Canadian Litigation Update Privacy class action authorized against Target The Superior Court of Québec recently authorized a privacy class action in Zuckerman v. Target Corporation. The petitioner alleged damages as a results of a data breach involving an estimated 40 million credit and debit cards, as well as the personal information of up to 70 million customers. Target made a public acknowledgement in late 2013, stating that there had been unauthorized access to payment card data in its U.S. stores. Names, card numbers, expiration dates, and security codes were accessed. More than 80 class actions followed in the U.S., ultimately consolidating into a single proceeding. In Canada, only the Zuckerman class action was filed. On behalf of the class, the petitioner alleged damages for fear, confusion, and loss of time, costs or fees for credit monitoring services, Target s failure to notify some members of the breach, and potential fraud or identity theft. In contrast to the Home Depot s quick and proactive response to a cyber breach in 2014, the Privacy Commission found that Target did not provide timely notifi cation to its customers. While breach notifi cation is only mandatory in Alberta, organizations may still decide to notify on a voluntary basis, especially if customers are going to argue that their damages were aggravated because they did not receive timely notification. Businesses may wish to invest in prevention and ensure that they have adequate security measures in place. 4 State of the Market: Cyber and privacy liability

5 Under the new the Personal Information Protection and Electronic Documents Act it will be a criminal offence for an organization to knowingly fail to report breaches, punishable by significant fines. This may also serve as a warning to businesses that their actions in one jurisdiction can lead to signifi cant legal exposure in another, in situations where their customer bases extend beyond provincial, state, or national borders. U.S. Regulatory Update New York cyber security regulations for financial institutions come into effect On 1 March 2017, the New York Department of Financial Services (DFS) cyber security regulations came into full effect. All financial institutions must formally assess their cyber security risks and establish and maintain a cyber security program. In addition, they must also ensure that all third-party companies in which they do business demonstrate a minimum level of cyber security and report any breaches that impacts their data. The cyber security regulations are in direct response to the increasing number of cyberattacks on insurers and fi nancial institutions, such as the 2016 cyber-attack on the central bank of Bangladesh in which stolen SWIFT credentials and malware were used to illegally transfer $81 million of funds held at the Federal Reserve Bank of New York. The cyber security regulations are the fi rst state-mandated regulations to address cyber security threats. Most of the cyber security regulations are practiced by financial institutions and subject to the Gramm-Leach-Bliley Act (GLBA). However, the regulations are broader in some key respects. The regulations have a wider defi nition of fi nancial institutions; information protected extends beyond personally identifiable financial information to include all non-public electronic information, mandatory multi-factor authentication for remote access to secure company networks, obligation to designate a qualifi ed individual to act as a chief information security offi cer (CISO), and mandatory reporting of all breaches. The last three requirements have Canadian security experts taking notice as Canada s current regulations are not as robust. The regulations demonstrate the ongoing shift in public policy towards a more watchful and regulated approach with respect to data privacy and serve as an apt reminder of the importance of continually assessing and managing risk in an environment of escalating cyber security threats. Other legislative measures addressing cyber risks are expected to be adopted both in the U.S. and Canada, including the requirement to report security breaches under the Digital Privacy Act. U.S. Litigation Update Home Depot settles data breach suit with financial institutions Home Depot Inc. (Home Depot) has reached a $25 million settlement with banks and credit unions in connection with its massive 2014 data breach. The lawsuit and settlement represent the consolidation of over 25 class actions against Home Depot by 50 financial institutions. The $25 million will be paid into a fund to be distributed to financial institutions that have not already released their claims. Home Depot will pay another $2.25 million to compensate certain entities whose claims had been released by a sponsor, adding to the $14.5 million in premiums already paid to MasterCard and Visa issuers in exchange for releases. According to the proposed settlement, Home Depot will pay the costs of notice and administration and attorney s fees and expenses separately. They have also agreed to implement security measures to reduce the risk of a future data beach. Home Depot had previously reached a $19.5 million settlement with consumers impacted by the data breach. Aon Risk Solutions 5

6 Yahoo faces another securities class action lawsuit due to a data breach In December 2016, Yahoo announced that an unauthorized third party stole data associated with more than one billion user accounts. The account information was believed to included names, addresses, telephone numbers, dates of birth, hashed passwords (using MD5), and in some cases, encrypted or unencrypted security questions and answers. Yahoo believes that this attack, which took place in 2013, is distinct from the incident the company disclosed in September A securities class action lawsuit was fi led on 24 January 2017 in the Northern District of California alleging that Yahoo made false or misleading statements or failed to disclose that they did not encrypt its users personal information, among other things. The complaint also alleges that following the company s December 2016 data breach disclosure, the company s share price declined 6.11 percent. There have been few date breach-related security class action lawsuits fi led in the U.S., in part because companies share prices generally do not react to data breach disclosures. It remains to be seen if this claimant will have more success than other claimants that have tried to pursue data breach related directors and offi cers claims. Data breach-related shareholder derivative lawsuit filed against Wendy s In January 2016, Wendy s began investigating a potential data breach and by June 2016, discovered malware that affected at least 350 restaurant s point of sale systems. The data breach, which occurred from October 2015 to June 2016, is alleged to have affected over 1,000 customers personal and financial information. On 16 December 2016, a plaintiff shareholder fi led a derivate lawsuit in the Southern District of Ohio against Wendy s and 19 of its current and former directors and offi cers. The complaint sets forth causes of action for breach of fi duciary duty, waste of corporate assets, unjust enrichment, and gross mismanagement. Wendy s is now defending itself against three lawsuits. First, a class action litigation on behalf of fi nancial institutions for negligence. Second, a class action lawsuit on behalf of Wendy s customers alleging claims for breach of implied contract, negligence, violations of state consumer protection laws, and violations of state data breach statutes. Lastly, this shareholder derivative suit, which can often follow a cyber data breach incident. This is the latest in a line of U.S. derivative lawsuits related to cyber security incidents, most of which have been dismissed by the courts. Although cyber-breach-related derivative lawsuits have not fared particularly well, it is unlikely that we have seen the last of them as the outcome may change where an organization is found to have inadequate security processes or have given minimal time and attention to cybersecurity issues. We-Vibe will pay $5 million to settle privacy class action A Canadian sex toy manufacturer has reached a settlement in a class action lawsuit over allegedly unauthorized data collection linked to its We-Vibe vibrators. The lawsuit claimed the app collected data on use of the vibrator, including the date and time of each use as well as vibration, temperature and intensity settings, and how often the toys were used without the user s knowledge. The suit also alleged the data and the user s personal address were transmitted to company servers in Canada. Under the terms of the settlement, Standard Innovation Corp. will pay $5 million as well as destroy collected data and stop recording users personal information. The settlement offers compensation for persons who purchased bluetooth-enabled We-Vibe products or who downloaded and used the We- Connect app. Class members who want to object to the settlement or opt out must do so by 29 June State of the Market: Cyber and privacy liability

7 Key Contacts Brian Rosenbaum, LL.B. Senior Vice President and National Director Legal and Research Practice t brian.rosenbaum@aon.ca Desiree Money, CAIB, CRM Senior Vice President and Regional Manager t desiree.money@aon.ca Catherine Richmond, LL.B., CRM Senior Vice President and Regional Manager t m catherine.richmond@aon.ca Catherine Lanctôt, B.A. Vice President and Manager t catherine.lanctot@aon.ca Denise Hall Senior Vice President and National Broking Leader t m denise.hall@aon.ca About Aon Risk Solutions Canada Aon Reed Stenhouse For more than 160 years, in one form or another, Aon Reed Stenhouse has been a major force in the Canadian insurance industry. Aon Reed Stenhouse, operating under the brand name Aon Risk Solutions, is Canada s leading insurance brokerage and risk management services firm. We serve an extensive client base, handling more than $2 billion in annual premiums on behalf of our clients. Insurance brokerage Risk management Employee health and benefi ts Our 1,600 professionals serve clients from 23 offi ces located across Canada. We provide our clients with a wide range of innovative solutions. Each day, Aon professionals work to deliver the best solutions to our clients. Aon Risk Solutions 7

8 About Aon Aon plc (NYSE:AON) is a leading global professional services fi rm providing a broad range of risk, retirement and health solutions. Our 50,000 colleagues in 120 countries empower results for clients by using proprietary data and analytics to deliver insights that reduce volatility and improve performance. Aon Reed Stenhouse 2017 Inc. All rights reserved. The information contained herein and the statements expressed are of a general nature and are not intended to address the circumstances of any particular individual or entity. Although we endeavor to provide accurate and timely information and use sources we consider reliable, there can be no guarantee that such information is accurate as of the date it is received or that it will continue to be accurate in the future. No one should act on such information without appropriate professional advice after a thorough examination of the particular situation.

Aon Risk Solutions Financial Services Group. Market Update. Employment practices liability. June Risk. Reinsurance. Human Resources.

Aon Risk Solutions Financial Services Group. Market Update. Employment practices liability. June Risk. Reinsurance. Human Resources. Aon Risk Solutions Market Update Employment practices liability June 2017 Risk. Reinsurance. Human Resources. Market Overview The Canadian market for employment practices liability (EPL) insurance coverage

More information

Media Liability Risks for Financial Advisors

Media Liability Risks for Financial Advisors Aon Risk Solutions Media Liability Risks for Financial Advisors January 2015 Risk. Reinsurance. Human Resources. Introduction In an effort to keep up in the age of Facebook and Twitter, an increasing number

More information

Real Estate Organizational Risks

Real Estate Organizational Risks Aon Risk Solutions Real Estate Organizational Risks Avoiding gaps in coverage when insuring non-traditional organizational structures June 2015 Risk. Reinsurance. Human Resources. Investors in the real

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

Cyber Insurance 2017:

Cyber Insurance 2017: Cyber Insurance 2017: Ensuring Your Coverage is Sound Thursday, March 23, 2017 Attorney Advertising Prior results do not guarantee a similar outcome 777 East Wisconsin Avenue, Milwaukee, WI 53202 414.271.2400

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

Aon Cyber Risk and Directors & Officers Forum CRM011

Aon Cyber Risk and Directors & Officers Forum CRM011 Aon Cyber Risk and Directors & Officers Forum CRM011 Speakers: Leslie Lamb, Director, Global Risk & Resiliency Management, Cisco Systems Timothy Fletcher, Senior Vice President and Team Leader, Aon Risk

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

Emerging legal and regulatory risks

Emerging legal and regulatory risks Emerging legal and regulatory risks Presentation for AusCERT2016 Matthew Pokarier and Ben Di Marco Structure Regulatory risks Third-party liability Actions by affected individuals Actions by banks and

More information

T A B L E of C O N T E N T S

T A B L E of C O N T E N T S INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

Data Breach Financial Protection Program Terms and Conditions

Data Breach Financial Protection Program Terms and Conditions Data Breach Financial Protection Program Terms and Conditions The Data Breach Financial Protection Program (the Program ) is a comprehensive expense reimbursement program, provided with some Netsurion

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

The working roundtable was conducted through two interdisciplinary panel sessions:

The working roundtable was conducted through two interdisciplinary panel sessions: As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal

More information

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018 1 HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier March 22, 2018 2 Today s Panel: Kimberly Holmes - Moderator - Vice President, Health Care, Cyber Liability & Emerging Risks, TDC Specialty Underwriters,

More information

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber Protection Data Creates Duties What data do you access, and

More information

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE

More information

S L tr lo a y t d egy s Cyber -Attack

S L tr lo a y t d egy s Cyber -Attack Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions Our Speakers Mark Melodia is Partner and Co-Head of the Global Data Security, Privacy & Management

More information

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No BEAZLEY BREACH RESPONSE APPLICATION NOTICE: THIS POLICY S LIABILITY INSURING AGREEMENTS PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY TO CLAIMS FIRST MADE AGAINST THE INSURED DURING

More information

CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP

CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP www.willis.com July 2015 CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP INSIDE THIS EDITION... CYBER CLAIMS LANDSCAPE A SAMPLING OF LARGE CYBER SETTLEMENTS LEGAL

More information

When The Wind Blows: Renewable Energy Risk Management Strategies

When The Wind Blows: Renewable Energy Risk Management Strategies When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and

More information

NEW CYBER RULES FOR NEW YORK-BASED BANKING, INSURANCE AND FINANCIAL SERVICE FIRMS HAVE FAR-REACHING EFFECTS

NEW CYBER RULES FOR NEW YORK-BASED BANKING, INSURANCE AND FINANCIAL SERVICE FIRMS HAVE FAR-REACHING EFFECTS REGULATORY LAW ALERT JUNE 2017 NEW CYBER RULES FOR NEW YORK-BASED BANKING, INSURANCE AND FINANCIAL SERVICE FIRMS HAVE FAR-REACHING EFFECTS OVERVIEW In potentially the most significant state-level expansion

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

Comprehensive Coverage for Not-for-Profit Organizations

Comprehensive Coverage for Not-for-Profit Organizations Comprehensive Coverage for Not-for-Profit Organizations Including Directors and Officers Liability (D&O), Employment Practices (EPL), and Fiduciary Liability (FL) Insurance Solutions Chubb is pleased

More information

Credit Card Handling Security Standards

Credit Card Handling Security Standards Credit Card Handling Security Standards Overview This document is intended to provide guidance regarding the processing of charges and credits on credit and/or debit cards. These standards are intended

More information

MANUFACTURE AND SALE OF GOODS

MANUFACTURE AND SALE OF GOODS Regulations and Product Standards 59 Consumer Protection 60 Product Liability 61 By Caroline Zayid Manufacture and Sale of Goods 59 Regulations and Product Standards The Canada Consumer Product Safety

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor This Addendum is applicable only in those situations where the Selected

More information

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016 Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions June 2016 Program Overview Regulatory Environment Who Needs a Privacy Program and Common Questions Components of a Comprehensive

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

The Internet of Everything: Building Cyber Resilience in a Connected World

The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute),

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), www.pli.edu/plicurrent. PLI Current The Journal of PLI Press Vol.

More information

Protecting Your Credit Union

Protecting Your Credit Union Protecting Your Credit Union A More Strategic Approach Fall 2011 As a credit union, you are strategic in everything you do. Matt Sweeney, MBA, AAI Credit Union Practice Leader 816.960.9181 msweeney@lockton.com

More information

Privacy in Canada Federal Legislation: Personal Information Protection and Electronic Documents Act

Privacy in Canada Federal Legislation: Personal Information Protection and Electronic Documents Act Table of Contents Introduction Privacy in Canada Definition of Personal Information : the ten principles Accountability Identifying Purposes Consent Limiting Collection Limiting Use, Disclosure, and Retention

More information

THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY CRISIS MANAGEMENT COVERAGE The Insurer shall pay on behalf of the Insured: 1) Crisis Management Expenses that are a direct result of a Network

More information

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional Services: $100,000 $250,000 $500,000 $1,000,000 $2,000,000 Other:$ Technology Product

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION A. Please indicate the coverages, limits and deductibles desired on the chart below. APPLICANT NAME: NATIONAL

More information

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834, Cyber and Privacy Coverage Section, is used to apply for cyber and privacy coverage. The form was designed to be used in conjunction

More information

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear

More information

2015 EMEA Cyber Impact Report

2015 EMEA Cyber Impact Report Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal

More information

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP HOW TO NAVIGATE THE LANDSCAPE OF GLOBAL PRIVACY AND DATA PROTECTION Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP Topics to Cover General Concepts Increased U.S. enforcement activity

More information

INFORMATION AND CYBER SECURITY POLICY V1.1

INFORMATION AND CYBER SECURITY POLICY V1.1 Future Generali 1 INFORMATION AND CYBER SECURITY V1.1 Future Generali 2 Revision History Revision / Version No. 1.0 1.1 Rollout Date Location of change 14-07- 2017 Mumbai 25.04.20 18 Thane Changed by Original

More information

DATA COMPROMISE COVERAGE FORM

DATA COMPROMISE COVERAGE FORM DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout

More information

Title CIHI Submission: 2014 Prescribed Entity Review

Title CIHI Submission: 2014 Prescribed Entity Review Title CIHI Submission: 2014 Prescribed Entity Review Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and integrated health

More information

Equifax Data Breach: Your Vital Next Steps

Equifax Data Breach: Your Vital Next Steps Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data

More information

Cyber & Network Risk. Products & Services

Cyber & Network Risk. Products & Services Cyber & Network Risk Products & Services We offer our insureds and broker partners a dedicated, industry recognized team backed by the scale, ratings and financial stability of one of the largest global

More information

Loblaw Card Cardholder Agreement

Loblaw Card Cardholder Agreement Loblaw Card Cardholder Agreement Please read this Agreement carefully and retain a copy for your records. The following terms and conditions apply to your use of the $25 Loblaw Card. By applying for, activating,

More information

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines? Q: What is PCI? A: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information maintain

More information

Responding to Privacy Breaches

Responding to Privacy Breaches Key Steps in Responding to Privacy Breaches The purpose of this document is to provide guidance to private sector organizations, health custodians and public sector bodies on how to manage a privacy breach.

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

Intellectual Property Risk Landscape. November 2018

Intellectual Property Risk Landscape. November 2018 Intellectual Property Risk Landscape November 2018 Table of Contents Asset Value Rotation and the Financial Market Response.... 1 Innovation: Threat and Opportunity.... 2 A Strategic Approach...2 Protecting

More information

A GUIDE TO PURCHASING LAWYER S PROFESSIONAL LIABILITY INSURANCE IN VIRGINIA

A GUIDE TO PURCHASING LAWYER S PROFESSIONAL LIABILITY INSURANCE IN VIRGINIA A GUIDE TO PURCHASING LAWYER S PROFESSIONAL LIABILITY INSURANCE IN VIRGINIA Presented By The Virginia State Bar's Special Committee on Lawyer Malpractice Insurance August 2008 The Need For Professional

More information

Case 3:13-cv Document 49 Filed 07/18/13 Page 1 of 39 PageID #: 959

Case 3:13-cv Document 49 Filed 07/18/13 Page 1 of 39 PageID #: 959 Case 3:13-cv-00202 Document 49 Filed 07/18/13 Page 1 of 39 PageID #: 959 Case 3:13-cv-00202 Document 49 Filed 07/18/13 Page 2 of 39 PageID #: 960 Case 3:13-cv-00202 Document 49 Filed 07/18/13 Page 3 of

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters

More information

REF STANDARD PROVISIONS

REF STANDARD PROVISIONS This Data Protection Addendum ( Addendum ) is an add- on to the Purchasing Terms and Conditions. It is applicable only in those situations where the Selected Firm/Vendor provides goods or services under

More information

Beazley Financial Institutions

Beazley Financial Institutions Market leading protection tailored for financial institutions, providing seamless cover from crime and professional indemnity to directors & officers and data breach. 0 1 0 0 1 1 0 0 0 1 1 0 Beazley Financial

More information

PCI security standards: A high-level overview

PCI security standards: A high-level overview PCI security standards: A high-level overview Prepared by: Joel Dubin, Manager, RSM US LLP joel.dubin@rsmus.com, +1 312 634 3422 Many merchants often have difficulty understanding how they must comply

More information

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas

Cyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers

More information

CPAOnePro Risk Purchasing Group Application

CPAOnePro Risk Purchasing Group Application Underwritten by The Hanover Insurance Company CPAOnePro Risk Purchasing Group Application CLAIMS-MADE WARNING FOR APPLICATION THIS POLICY PROVIDES COVERAGE ON A CLAIMS-MADE BASIS. SUBJECT TO ITS TERMS,

More information

Electronic Payments: The Winds of Change, A Call to Action. Will 2011 Be An Eventful Year in the History of Payment Card Security?

Electronic Payments: The Winds of Change, A Call to Action. Will 2011 Be An Eventful Year in the History of Payment Card Security? Electronic Payments: The Winds of Change, A Call to Action Will 2011 Be An Eventful Year in the History of Payment Card Security? 1 Presenter W. Stephen Cannon, Chairman, Constantine Cannon LLP Former

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment Sponsored by Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment Table of Contents Welcome 3 Executive Summary 4 Introduction and Methodology 6 Preparation and Readiness 8 - Client Awareness

More information

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No. Most Recent Twelve (12) months: (ending: / )

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No. Most Recent Twelve (12) months: (ending: / ) Beazley InfoSec Short Form Application NOTICE: THIS POLICY S LIABILITY INSURING AGREEMENTS PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY TO CLAIMS FIRST MADE AGAINST THE INSURED DURING

More information

503 SURVIVING A HIPAA BREACH INVESTIGATION

503 SURVIVING A HIPAA BREACH INVESTIGATION 503 SURVIVING A HIPAA BREACH INVESTIGATION Presented by Nicole Hughes Waid, Esq. Mark J. Swearingen, Esq. Celeste H. Davis, Esq. Regional Manager 1 Surviving a HIPAA Breach Investigation: Enforcement Presented

More information

Cyber Risk Insurance. Frequently Asked Questions

Cyber Risk Insurance. Frequently Asked Questions Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy

More information

Cyber Liability Launch Event Moscow

Cyber Liability Launch Event Moscow Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES I, Maria T. Vullo, Superintendent of Financial Services, pursuant to the

More information

DOJ Postpones Website Accessibility Proceeding: How Businesses Can Prepare in Anticipation of a Lawsuit and How to Maximize Your Insurance Once Served

DOJ Postpones Website Accessibility Proceeding: How Businesses Can Prepare in Anticipation of a Lawsuit and How to Maximize Your Insurance Once Served DOJ Postpones Website Accessibility Proceeding: How Businesses Can Prepare in Anticipation of a Lawsuit and How to Maximize Your Insurance Once Served by Kimberly S. Reindl and Selena J. Linde The Department

More information

H 7789 S T A T E O F R H O D E I S L A N D

H 7789 S T A T E O F R H O D E I S L A N D ======== LC001 ======== 01 -- H S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 01 A N A C T RELATING TO INSURANCE - INSURANCE DATA SECURITY ACT Introduced By: Representatives

More information

PayPal Website Payments Pro and Virtual Terminal Agreement

PayPal Website Payments Pro and Virtual Terminal Agreement >> View all legal agreements PayPal Website Payments Pro and Virtual Terminal Agreement Last Update: March 29, 2017 Print Download PDF This PayPal Website Payments Pro and Virtual Terminal agreement ("Pro/VT

More information

AS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection

AS PASSED BY HOUSE AND SENATE H Page 1 of 37 H.764. An act relating to data brokers and consumer protection 2018 Page 1 of 37 H.764 An act relating to data brokers and consumer protection It is hereby enacted by the General Assembly of the State of Vermont: Sec. 1. FINDINGS AND INTENT (a) The General Assembly

More information

Understanding Cyber Risk in the Dental Office. Melissa Moore Sanchez, CIC

Understanding Cyber Risk in the Dental Office. Melissa Moore Sanchez, CIC Understanding Cyber Risk in the Dental Office Melissa Moore Sanchez, CIC Data Breaches are Escalating Between February 5, 2005 and May 26, 2012 561,465,563 records containing sensitive personal information

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

Great Expectations: What Design Firms Expect from Outside Counsel

Great Expectations: What Design Firms Expect from Outside Counsel Schinnerer s 54 th Annual Meeting of Invited Attorneys 1 Great Expectations: What Design Firms Expect from Outside Counsel by Alison R. Mullins, Esquire Expectation management is the key to all successful

More information

Critical Issues in Cybersecurity:

Critical Issues in Cybersecurity: Critical Issues in Cybersecurity: Are you prepared and in compliance? July 27, 2017 Robert Barbarowicz Scott Lyon JillAllison Opell 1 What Types of Information do We Collect? PII v. PHI v. NPI v. sensitive/confidential

More information

Healthcare Data Breaches: Handle with Care.

Healthcare Data Breaches: Handle with Care. Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice

More information

Data breaches only or disproportionately affect retail merchants.

Data breaches only or disproportionately affect retail merchants. October 30, 2014 Mr. Jim Nussle Credit Union National Association 601 Pennsylvania Ave NW, South Bldg. Washington DC 20004 Mr. Dan Berger National Association of Federal Credit Unions 3138 10 th Street

More information

Defending Litigation After a Data Breach

Defending Litigation After a Data Breach Defending Litigation After a Data Breach November 9, 2016 Stewart Baker Steptoe & Johnson LLP Defending Litigation After a Data Breach Class Action Suits Commonly Filed By: Consumers Financial Institutions

More information

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION NOTICE: INSURING AGREEMENTS I.A., I.C., I.D. AND I.F. OF THIS POLICY PROVIDE COVERAGE

More information