IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY

Size: px
Start display at page:

Download "IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY"

Transcription

1 IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY

2 Slide 1 Identity Theft Coverage on Insurance Policies November 8, 2013 Slide 2 What s the big deal? Slide 3 PII Personally Identifiable Information

3 Slide 4 PII Among other things, First Name (or initial) and Last Name in combination with either: Social Security Number Drivers License Number Financial Account Number Credit/Debit Card Number Slide 5 PII HOLDERS YOU! Information technology Small businesses that use outside vendors State government Accountants Manufacturing Financial institutions Utilities, energy Education Any business with a website used for e-commerce Slide STATISTICS Number of people victimized increased 13 percent, to 12 million 2.2 million more victims than in 2011 Overall losses from identity fraud also fell last year, to $37 billion Source: Javelin Security and Research Inc.

4 Slide 7 However Average amount of time to clear one s credit history estimated at 607 hours Source: Identity Theft Resource Center Slide 8 Over 20% of victims have increased medical expenses due to stress resulting from the emotional impact of identity fraud Source: Identity Theft Resource Center Slide 9 Average out of pocket expenses: 2009: $ : $631 Source: Identity Theft Resource Center

5 Slide 10 New ways of doing business Slide 11 New ways of doing business Slide 12 Rise in identity fraud tied to smartphone use

6 Slide 13 Slide 14 Slide 15

7 Slide 16 RISK MANAGEMENT TECHNIQUES Avoidance Prevention Slide 17 Slide 18 PASSWORDS THAT SAY HACK ME Password 5. iloveyou 6. princess 7. rockyou abc [Your Name] 12. [Your mate s name] 13. babygirl 14. monkey 15. Jessica 16. Lovely 17. michael 18. Ashley Qwerty

8 Slide 19 TrSwTwSi04&07bN12 Ih2dWa28&32Yo M5kpri24:51 Slide 20 PREVENTION Shred Don t carry Social Security card (Medicare!) Slide 21 PREVENTION Don t carry all of your credit cards Be careful about leaving outgoing mail in your mailbox with the flag up

9 Slide 22 PREVENTION Check your bank statement every month Get your credit report every year Pick a random PIN When ordering checks, pick them up at the bank Slide 23 RISK MANAGEMENT TECHNIQUES Retain the exposure Slide 24 IF THE CUSTOMER RETAINS THE EXPOSURE Passive Retention Don t ask, don t tell E & O Active Retention

10 Slide 25 RISK MANAGEMENT TECHNIQUES Retain the exposure Fund a reserve for the exposure Contractually transfer the exposure Slide 26 ALTERNATIVES TRANSFER CHOICES: Credit card coverage Bank coverage Stand-alone coverage Slide 27 RISK MANAGEMENT TECHNIQUES Retain the exposure Fund a reserve for the exposure Contractually transfer the exposure Transfer to Insurance Company

11 Slide 28 ISO HO-91 version 6. Credit Card, Fund Transfer Card, Forgery and Counterfeit Money We will pay up to $500 for: Legal obligation from loss of credit card Loss resulting from theft/unauthorized use of a fund transfer card Slide 29 ISO HO-91 version 6. Credit Card, Fund Transfer Card, Forgery and Counterfeit Money We will pay up to $500 for: Loss caused by forgery or alteration Loss from accepting counterfeit currency Slide 30 ISO HO-2000 &2011 version 6. Credit Card, Electronic Fund Transfer Card, Forgery and Counterfeit Money

12 Slide 31 Example of ID Theft Expenses Long distance phone expense $467 Notary fees $200 Lawyer expenses (for help with $3,450 affidavits) Copying and Mailing Costs $142 Total Costs Covered by Homeowners $0 Total Costs $4,259 Slide 32 Increases $500 limit to up to $10,000 Slide 33 Pays for your: Lost Income to meet with lawyers ($200 per day) Reasonable attorney fees to defend you

13 Slide 34 Pays for your: Loan origination fees Long distance calls Mailing costs All Subject to $15,000 per occurrence Slide 35 All Subject to $250 deductible Slide 36 Example of ID Theft Expenses with HO Long distance phone expense $467 Notary fees $200 Lawyer expenses (for help with $3,450 affidavits) Copying and Mailing Costs $142 Total Costs $4,259 Total Costs Covered by Homeowners $4,259

14 Slide 37 Is That Enough? Slide 38 Data Breaches to Companies 80% cost < $1M 15% cost between $1M and $20M 5% cost > $20M Slide 39

15 Slide 40 Business Income/Extra Expense Slide 41 Data Processing Equipment, Media and Data Inland Marine Policies Slide 42

16 Slide 43 Slide 44 Commercial Crime Policy Slide 45 Types of Cyber Coverage and Limits Available

17 Slide 46 Liability Remediation Fines and/or Penalties Slide 47 Slide 48 Failure to secure data Loss caused by an employee Acts by persons other than insureds Loss resulting from the theft or disappearance of private property

18 Slide 49 Types of Data Covered Slide 50 An individual s personally identifiable information Nonpublic data (such as corporate information) Non-electronic data, such as paper records and printouts Slide 51 Remediation Costs

19 Slide 52 Crisis management services Notification of potentially affected customers Credit monitoring services to affected customers Costs to re-secure data Slide 53 EXTERNAL REMEDIATION COSTS Cyber-crime attorney services: fees run $700 per hour Investigation: computer forensics fees ranging from $300 to $700 per hour Slide 54 EXTERNAL REMEDIATION COSTS Public Relations Experts: to deal with the media with charges running perhaps $10,000/month billed at rates of $400 per hour

20 Slide 55 REMEDIATION COVERAGE SERVICES Remediation services are prenegotiated and prepackaged Much like Kidnap and Ransom coverage, knowing how to respond to a loss can be daunting. Slide 56 PROPERTY AND THEFT COVERAGES Proprietary data is the most important that has to be considered but also data that is in your insured s care, custody or control Slide 57 LIABILITY COVERAGE Carefully consider who is an insured Policies differ Most policies do not cover subcontractors, who may represent the largest exposure Most will add subs for an additional premium

21 Slide 58 LIABILITY COVERAGE Clarify what is a claim Again, policies differ Policies do not specifically address the effects of phishing, pharming, or identity theft They are addressed through breach of security sections, or unauthorized access Slide 59 CLAIMS REPORTING, ERP OPTIONS, AND COUNSEL All liability forms are claims-made Extended Reporting Period options are important Carriers reserve the right to choose counsel Slide 60 PRIOR ACTS COVERAGE All policies offer prior acts coverage Many require it Territory All of the policies provide true worldwide coverage, regardless of where the suit is brought

22 Slide 61 SPECIFIC COVERAGES INCLUDED IN POLICY Errors & Omissions Virus Unauthorized Access Security Breach Slide 62 SPECIFIC COVERAGES INCLUDED IN POLICY Personal Injury Advertising Injury Loss of Use Resulting Business Interruption Slide 63 SPECIFIC COVERAGES INCLUDED IN POLICY Copyright Infringement Trademark or Service mark Infringement Patent Infringement

23 Slide 64 EXCLUSIONS Every policy differs; Watch for those related to: Bankruptcy/financial impairment Intentional acts Theft of Intellectual Property Loss of use Contractual Liability Slide 65 RISK MANAGEMENT SERVICES All of the companies offer risk management services, such as loss prevention, and risk assessments Depending on the size of the account, a prior risk assessment may be required before pricing Many also offer tests by third-party service providers Slide 66 Sometimes insurance is not the answer But, making customers aware of the coverage can save you E&O problems

24 Slide 67 But we had locks Carol Meyerowitz CEO, TJX Companies June 26, 2007

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

Risk Insurance Management Society, Inc. Summary of Insurance: 6/30/2014 to 6/30/2015

Risk Insurance Management Society, Inc. Summary of Insurance: 6/30/2014 to 6/30/2015 Property Blanket Limits Locations: (1) 1065 Avenue of the Americas Blanket Personal Property $2,800,000. EDP Equipment $2,000,000 Business Income/Extra Expense $7,648,945 Extended Period Unlimited Personal

More information

Cyber Risks & Cyber Insurance

Cyber Risks & Cyber Insurance Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

Data Breach Program Pricing Companies with revenues less than $1,000,000

Data Breach Program Pricing Companies with revenues less than $1,000,000 Data Breach Program Pricing Companies with revenues less than Limit of Liability Aggregate $250,000 $500,000 $2,000,000 Retention $1,000 $1,000 $1,000 $1,000 25,000 records $250,000 $500,000 Security &

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

INTRODUCTION... ERROR! BOOKMARK NOT DEFINED. YOUR ORGANIZATION... ERROR! BOOKMARK NOT DEFINED. EXPERTISE... ERROR! BOOKMARK NOT DEFINED.

INTRODUCTION... ERROR! BOOKMARK NOT DEFINED. YOUR ORGANIZATION... ERROR! BOOKMARK NOT DEFINED. EXPERTISE... ERROR! BOOKMARK NOT DEFINED. TABLE OF CONTENTS INTRODUCTION... ERROR! BOOKMARK NOT DEFINED. YOUR ORGANIZATION... ERROR! BOOKMARK NOT DEFINED. EXPERTISE... ERROR! BOOKMARK NOT DEFINED. SPECIAL SERVICES... ERROR! BOOKMARK NOT DEFINED.

More information

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

When The Wind Blows: Renewable Energy Risk Management Strategies

When The Wind Blows: Renewable Energy Risk Management Strategies When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and

More information

Cyber Liability: New Exposures

Cyber Liability: New Exposures Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders

More information

Cyber Insurance for Lawyers

Cyber Insurance for Lawyers Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime

More information

Cyber Risk Insurance. Frequently Asked Questions

Cyber Risk Insurance. Frequently Asked Questions Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy

More information

Philips Lumify Service Subscription Agreement

Philips Lumify Service Subscription Agreement 1 Philips Lumify Service Subscription Agreement IMPORTANT -- READ THESE TERMS CAREFULLY BEFORE CONFIRMING YOUR LUMIFY ORDER When you confirm your Lumify order, you acknowledge that you have read this subscription

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing

More information

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW INSURANCE RISK MANAGEMENT EMPLOYEE BENEFITS Presented by: Douglas R. Jones, CPCU, ARM, Senior Vice President, Principal www.rhsb.com

More information

Cyber Risk Mitigation

Cyber Risk Mitigation Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information

More information

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Cyber Liability A New Must Have Coverage for Your Soccer Organization Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web

More information

ConSept: Policy Highlights: Other Coverage Features

ConSept: Policy Highlights: Other Coverage Features An ever changing and increasingly regulated business environment presents a plethora of risks and threats for Companies, who face potential litigation, financial loss, discrimination claims or on-line

More information

What Solo and Small Firms Need to Know about Malpractice Insurance

What Solo and Small Firms Need to Know about Malpractice Insurance What Solo and Small Firms Need to Know about Malpractice Insurance Insurance Considerations 2 Greg Cooke Sales Manager USI Affinity Practice 360 - A Day for Lawyers & Law Firms May 6, 2016 2 Agenda 3 Where

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

West Marine Products Inc. $250 West Marine Gift Card Sweepstakes Official Rules

West Marine Products Inc. $250 West Marine Gift Card Sweepstakes Official Rules West Marine Products Inc. $250 West Marine Gift Card Sweepstakes Official Rules NO PURCHASE NECESSARY. OPEN ONLY TO LEGAL RESIDENTS OF THE 50 UNITED STATES AND DISTRICT OF COLUMBIA, AND PUERTO RICO 18

More information

UCIP COVERAGE SUMMARY

UCIP COVERAGE SUMMARY Save As UCIP COVERAGE SUMMARY EXHIBIT 1A THE REGENTS OF THE UNIVERSITY OF CALIFORNIA UNIVERSITY CONTROLLED INSURANCE PROGRAM (UCIP) This Exhibit summarizes the UCIP Commercial General Liability, Workers

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Brief #9.00. Business Insurance. Latest Revision: 4/ SCORE Ohio, Brief Number 9.00, Revised 4/ of 6

Brief #9.00. Business Insurance. Latest Revision: 4/ SCORE Ohio, Brief Number 9.00, Revised 4/ of 6 Brief #9.00 Latest Revision: 4/2017 Business Insurance An entrepreneurial business is a risk. Insurance can assist to minimize risk. Lack of appropriate insurance could lead to financial disaster. A basic

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber breaches: are you prepared?

Cyber breaches: are you prepared? Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do

More information

Managing E-Commerce Risks

Managing E-Commerce Risks Managing E-Commerce Risks, Chartered Insurer ACII (UK), CPCU (USA), ARe (USA), ARM (USA), FIII (India). MBA Email: manoj@einsuranceprofessional.com E-Commerce and Risk Management E-Commerce is the delivery

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

Checklist of Insurances Available

Checklist of Insurances Available Checklist of Insurances Available A general overview of the different classes of insurances available, some of which may already be included in your program. We suggest you use this information as a guide

More information

Cybersecurity Curveballs in Vendor Risk Management Programs

Cybersecurity Curveballs in Vendor Risk Management Programs Cybersecurity Curveballs in Vendor Programs 2016 SoCal Cybersecurity, & Data Protection Retreat November 7, 2016 2016 Reed Smith LLP. All rights reserved. The contents of this presentation are for informational

More information

Board of Legislators County Office Building, Room Court Street Belmont, New York Phone:

Board of Legislators County Office Building, Room Court Street Belmont, New York Phone: Board of Legislators County Office Building, Room 201 7 Court Street Belmont, New York 14813 Phone: 585-268-9222 WAYS AND MEANS COMMITTEE AGENDA June 20, 2018 1. Approval of Minutes - June 11, 2018, with

More information

PREMIER LIABILITY ENDORSEMENT DESCRIPTION. Additional Insured Coverage...9. Bail Bonds...7. Blanket Waiver of Subrogation...13

PREMIER LIABILITY ENDORSEMENT DESCRIPTION. Additional Insured Coverage...9. Bail Bonds...7. Blanket Waiver of Subrogation...13 PREMIER LIABILITY ENDORSEMENT TABLE OF CONTENTS DESCRIPTION PAGE Additional Insured Coverage...9 Bail Bonds...7 Blanket Waiver of Subrogation...13 Bodily Injury and Property Damage...1 Care, Custody or

More information

CYBER/PRIVACY INSURANCE MARKET SURVEY 2016

CYBER/PRIVACY INSURANCE MARKET SURVEY 2016 June 2016 CYBER/PRIVACY INSURANCE MARKET SURVEY 2016 A Tough Market for Larger Insureds, but Smaller Insureds Finding Eager Insurers Richard S. Betterley, CMC President Betterley Risk Consultants, Inc.

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

DATA COMPROMISE COVERAGE FORM

DATA COMPROMISE COVERAGE FORM DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout

More information

NON-PROFIT INSURANCE 101. Presented by Jamie Saunders and Jeff McCann

NON-PROFIT INSURANCE 101. Presented by Jamie Saunders and Jeff McCann NON-PROFIT INSURANCE 101 Presented by Jamie Saunders and Jeff McCann WORKSHOP OVERVIEW Introduction to the different coverages available to non-profit organizations. Directors & Officers Liability Commercial

More information

COMMERCIAL PACKAGE POLICY COVERAGES WITH CONTRACTOR SHIELDSM

COMMERCIAL PACKAGE POLICY COVERAGES WITH CONTRACTOR SHIELDSM contractor shield sm COMMERCIAL PACKAGE POLICY COVERAGES WITH IMPACT CONTRACTOR SHIELDSM For decades, Federated insurance products have been designed specifically for contractors to manage the risks and

More information

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute),

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), www.pli.edu/plicurrent. PLI Current The Journal of PLI Press Vol.

More information

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor This Addendum is applicable only in those situations where the Selected

More information

WNNK-FM WINK 104 WINK Wake Up Show Birthday Wheel Official Rules

WNNK-FM WINK 104 WINK Wake Up Show Birthday Wheel Official Rules WNNK-FM WINK 104 WINK Wake Up Show Birthday Wheel Official Rules A complete copy of these rules can be obtained at the offices of radio station insert call letters ( Station ),owned and operated by Cumulus

More information

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/

More information

TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2019

TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2019 February 2019 TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2019 Decent Growth, but Concerns about Cyber Linger Richard S. Betterley, LIA President Betterley Risk Consultants, Inc. Highlights of this Issue

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

NEW BUSINESS APPLICATION (For Private Companies with up to 250 Employees)

NEW BUSINESS APPLICATION (For Private Companies with up to 250 Employees) NEW BUSINESS APPLICATION (For Private Companies with up to 250 Employees) BY COMPLETING THIS NEW BUSINESS APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH FEDERAL INSURANCE COMPANY (THE COMPANY

More information

KTBB-FM/AM KRWR(FM) Official Contest Rules. No purchase is necessary. Void where prohibited. All federal, state, and local laws and regulations apply.

KTBB-FM/AM KRWR(FM) Official Contest Rules. No purchase is necessary. Void where prohibited. All federal, state, and local laws and regulations apply. KTBB-FM/AM KRWR(FM) Official Contest Rules No purchase is necessary. Void where prohibited. All federal, state, and local laws and regulations apply. Eligibility. Unless otherwise specified, all contests

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

Kaiser Permanente Terms and Conditions for the Purchase of Goods and Services

Kaiser Permanente Terms and Conditions for the Purchase of Goods and Services Kaiser Permanente Terms and Conditions for the Purchase of Goods and Services These Kaiser Permanente Terms and Conditions for the Purchase of Goods and Services (the Terms and Conditions ) apply to Purchase

More information

THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY CRISIS MANAGEMENT COVERAGE The Insurer shall pay on behalf of the Insured: 1) Crisis Management Expenses that are a direct result of a Network

More information

Renewal Application Management Liability Package for Not-for-Profit Organizations

Renewal Application Management Liability Package for Not-for-Profit Organizations NATIONAL LIABILITY & FIRE INSURANCE COMPANY 100 First Stamford Place P.O. Box 113247 Stamford, CT 06911-3247 BROKERING AGENT S REGISTER No. [Florida Applicant s Only] Renewal Application Management Liability

More information

What Solo and Small Firms Need to Know about Malpractice Insurance

What Solo and Small Firms Need to Know about Malpractice Insurance What Solo and Small Firms Need to Know about Malpractice Insurance 1 Insurance Considerations 2 Greg Cooke Vice President Sales & Client Management USI Affinity Practice 360 - A Day for Lawyers & Law Firms

More information

One Tower Square Hartford, Connecticut (A Stock Insurance Company, herein called the Company)

One Tower Square Hartford, Connecticut (A Stock Insurance Company, herein called the Company) Declarations POLICY NO. One Tower Square Hartford, Connecticut 06183 (A Stock Insurance Company, herein called the Company) THE LIABILITY COVERAGES AND THE THIRD PARTY LIABILITY INSURING AGREEMENTS ARE

More information

Official Rules for Cumulus Radio Station Contests & Sweepstakes

Official Rules for Cumulus Radio Station Contests & Sweepstakes Official Rules for Cumulus Radio Station Contests & Sweepstakes A complete copy of these rules can be obtained at the offices of any radio station owned and/or operated by Cumulus Radio Corp.( Sponsor

More information

Cyber Exposures: The Importance of Risk Identification and Transfer. Presented By: Joe Weipert

Cyber Exposures: The Importance of Risk Identification and Transfer. Presented By: Joe Weipert Cyber Exposures: The Importance of Risk Identification and Transfer Presented By: Joe Weipert The Complexity of Cyber Risk and its Severity My Goal Today: Getting Your Attention in 30 Minutes Average Claim

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

BOARD OF SUPERVISORS BUSINESS MEETING ACTION ITEM

BOARD OF SUPERVISORS BUSINESS MEETING ACTION ITEM Date of Meeting: June 22, 2017 BOARD OF SUPERVISORS BUSINESS MEETING ACTION ITEM # 12g SUBJECT: ELECTION DISTRICT: FINANCE/GOVERNMENT OPERATIONS AND ECONOMIC DEVELOPMENT COMMITTEE REPORT: Contract Award/Property,

More information

Attached are two forms. Please execute, sign and return to each of the following:

Attached are two forms. Please execute, sign and return to each of the following: May 21, 2018 To all suppliers: As part of our Risk Management Program, CVS require that all suppliers provide us with an Indemnification Agreement. By signing the Indemnification Agreement the vendor agrees

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

HIPAA / HITECH. Ed Massey Affiliated Marketing Group

HIPAA / HITECH. Ed Massey Affiliated Marketing Group HIPAA / HITECH Agent Understanding And Compliance Presented By: Ed Massey Affiliated Marketing Group It s The Law On February 17, 2010 the Health Information Technology for Economic and Clinical Health

More information

NO PURCHASE NECESSARY TO ENTER OR WIN.

NO PURCHASE NECESSARY TO ENTER OR WIN. OFFICIAL RULES NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE OR PAYMENT OF ANY KIND WILL NOT INCREASE YOUR CHANCES OF WINNING AS A CONDITION OF WINNING THE PRIZE, THE WINNER MUST BE AVAILABLE FOR TRAVEL

More information

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834, Cyber and Privacy Coverage Section, is used to apply for cyber and privacy coverage. The form was designed to be used in conjunction

More information

2018 Cyber & Tech Liability Risk Transfer Update Part 2

2018 Cyber & Tech Liability Risk Transfer Update Part 2 2018 Cyber & Tech Liability Risk Transfer Update Part 2 For: PARMA February 15, 2018 (Revised 2.19.2018) Copy of handout at www./parma2.pdf By: Robert J. Marshburn, CRM, CIC, ARM, CRIS, CISC, CCIP R. J.

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

WIOV-FM, WSOX-FM, WARM-FM VANSCOY, MAURER, & BASH DIAMOND JEWELERS COLLECTIVE CONTEST OFFICIAL RULES

WIOV-FM, WSOX-FM, WARM-FM VANSCOY, MAURER, & BASH DIAMOND JEWELERS COLLECTIVE CONTEST OFFICIAL RULES WIOV-FM, WSOX-FM, WARM-FM VANSCOY, MAURER, & BASH DIAMOND JEWELERS COLLECTIVE CONTEST OFFICIAL RULES A complete copy of these rules can be obtained at the offices of radio station WIOV-FM, WARM-FM, & WSOX-FM

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE Deerfield Insurance Company Evanston Insurance Company Essex Insurance Company Markel American Insurance Company Markel Insurance Company Associated International Insurance Company DataBreach SM APPLICATION

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

WINNING. VOID WHERE PROHIBITED. ALL FEDERAL, STATE, AND LOCAL REGULATIONS APPLY.

WINNING. VOID WHERE PROHIBITED. ALL FEDERAL, STATE, AND LOCAL REGULATIONS APPLY. KTIK PARTY PATROL CONTEST OFFICIAL RULES A complete copy of these rules can be obtained at the offices of radio station KTIK ( Station ), owned and operated by Cumulus Media Holdings Inc. or one of its

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

Cyber Liability Insurance for Sports Organizations

Cyber Liability Insurance for Sports Organizations Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media

More information

Fontaine Commercial Trailer. Terms and Conditions of Purchase Guide

Fontaine Commercial Trailer. Terms and Conditions of Purchase Guide Guide TERMS AND CONDITIONS OF PURCHASE 1. Acceptance; Agreement. These Terms and Conditions supersede all other terms and conditions, oral or written, and all other communications between the parties suggesting

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

BOARD OF SUPERVISORS FINANCE/GOVERNMENT OPERATIONS AND ECONOMIC DEVELOPMENT COMMITTEE ACTION ITEM

BOARD OF SUPERVISORS FINANCE/GOVERNMENT OPERATIONS AND ECONOMIC DEVELOPMENT COMMITTEE ACTION ITEM Date of Meeting: June 14, 2016 BOARD OF SUPERVISORS FINANCE/GOVERNMENT OPERATIONS AND ECONOMIC DEVELOPMENT COMMITTEE ACTION ITEM #8 SUBJECT: ELECTION DISTRICT: CONTRACT RENEWAL/Property, Liability and

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Modification of Services

Modification of Services These Terms and Conditions of Use ( Terms and Conditions of Use") apply to your access to, and use of, any Dickey s Barbecue Pit ("Dickey s") website, mobile application, and online service or program

More information

TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is

TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is under common control with, Donnelley Financial or Client,

More information

OFFICIAL RULES OF PG&E TELL US YOUR GREAT SMARTRATE IDEAS $500 SWEEPSTAKES

OFFICIAL RULES OF PG&E TELL US YOUR GREAT SMARTRATE IDEAS $500 SWEEPSTAKES OFFICIAL RULES OF PG&E TELL US YOUR GREAT SMARTRATE IDEAS $500 SWEEPSTAKES 1. NO PURCHASE OR ENROLLMENT AS A SmartRate PARTICIPANT, OR SUBMISSION OF A TESTIMONIAL, IS NECESSARY TO ENTER OR CLAIM PRIZE.

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

Identity Fraud Endorsement

Identity Fraud Endorsement 220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity

More information