FM Global. First-Party Property Cyber Coverage
|
|
- Gavin Goodman
- 5 years ago
- Views:
Transcription
1 First-Party Property Cyber Coverage
2
3 Introduction Cyber is Board of Directors level concern #1 issue for commercial insurance industry Everyone on steep learning curve
4 Objective and Agenda Understand differences between first party property cyber and third party cyber coverage - Walk through our findings - Discuss first party property cyber coverage s - Risk manager considerations
5 Cyber Risk Market Research Market maturity curve Current state of cyber insurance market Introductory Growth Maturity Decline
6 Cyber Risk Market Research Insurance purchases highly dependent on industry Industries with large amounts of personal and financial info purchase insurance at higher frequency Lack of confidence in products offered % of companies purchasing cyber insurance
7 Overview What is a cyber attack What is covered What is not covered Coverage differentiators
8 What Is a Cyber Attack Two Broad Categories 1. Introduction of malware (malicious code) a. Virus, spyware, Trojan horses b. Targeted hacking activity 2. Denial-of-Service Attacks
9 What Is Covered 1. Physical loss or damage to data a. Destruction, distortion or corruption of data, including from a malware event b. Resulting damage to property other than data on an all-risk basis 2. Time element loss resulting from denial-of-service attacks 3. Property damage and time element loss due to cloud or data services interruption
10 Malware Coverage
11 Loss or Damage to Data Data, Programs or Software coverage Data is covered property Restoration includes research and engineering Temporary costs to defend against a cyber attack Covered anywhere in policy s territory
12 Loss or Damage to Data Insured Location Damage to data Covered Resulting damage to other property Covered Cost to repair, replace or restore the data Covered
13 Loss or Damage to Data Customer or Supplier CTEE Utility - SI Insured Location Service Interruption (SI) loss Covered Third Party Contingent Time Element Extended (CTEE) loss Covered
14 Loss or Damage to Data Insured Location Data Center Damage to data is covered anywhere in Policy territory Covered
15 Loss or Damage to Data When data is damaged by malware 48-hour waiting period/time qualifier Monetary deductible
16 Loss or Damage to Data Loss Example Hacker infiltration over a period of months Wiper malware introduced Data deleted and overwritten Backups destroyed Network down for months
17 Loss or Damage to Data Typical data loss costs Identify and remediate malware Temporary Repairs to prevent further damage Repair of Data, Programs or Software Expedite permanent repair/replacement of DPS
18 Loss or Damage to Data Typical data loss costs Temporarily protect/preserve DPS against immediately impending threat Enhancement of security system and hardware
19 Resulting Damage
20 Resulting Damage Covered under the base form All-risk coverage under the Insuring Agreement Applies to property other than data Not sublimited to Data, Programs or Software limit Example: attacks on industrial control systems
21 Resulting Damage Examples: 2014: German Steel Mill 2010: Iranian Uranium Enrichment Plant (the Stuxnet worm)
22 Resulting Damage The Stuxnet Worm
23 Denial-of-Service Coverage
24 Denial-of-Service Coverage Computer Systems Non-Physical Damage coverage TE loss due to failure of system to operate No physical loss or damage required Temporary costs to defend against a cyber attack Trigger: Malicious act directed at Named Insured Insured s electronic data processing equipment or media
25 Denial-of-Service coverage 48-hour waiting period/time qualifier Monetary deductible
26 Denial-of-Service Attacks Everyday computers infected Synchronized army of attackers Traffic surge at target website
27 Denial-of-Service Attacks HACKER REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR REFLECTOR TARGET
28 Denial-of-Service Attacks Loss example Severe spike in internet traffic to company websites Overwhelmed network and data center Inaccessible internet services and mobile applications Attack lasted 20 hours
29 Cloud Coverage
30 Interruption of Cloud/Data Services Off Premises Data Services coverage Property Damage and Time Element loss Accidental event trigger Coverage applies worldwide Interruption of satellite services included
31 Interruption of Cloud/Data Services 24-hour waiting period/time qualifier Monetary deductible
32 Cyber attack Insured Location Property damage Covered Actual loss sustained and Extra Expense Covered Cloud Provider Coverage applies worldwide, including satellites
33 What s Not Covered
34 What s Not Covered Third-party liability Compromised data/personal information Consumer notification costs Copying and publishing of proprietary data Media liability Cyber extortion expenses
35 How does this coverage dovetail with standalone cyber?
36 If data, programs or software is Property Liability Corrupted Erased Altered/distorted Destroyed Stolen Copied Locked/encrypted where is it covered?
37 Other possible consequences Property Liability Resulting damage Breach expenses Business interruption Damaged reputation Legal damages Regulatory fines
38 Risk Manager Considerations Lots of confusion about cyber risk and coverage Clients don t know what they currently have Everyone wants in Increased client requests for risk assessment help Understand what you currently have Determine what you would like to have Treat like property/casualty Look for the broadest coverage in each area
39 Francis M. Desousa Operations Vice President Senior Business Development Executive Country Club Blvd. Suite 400 North Olmsted, OH T: C: F: E:
Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationA GUIDE TO CYBER RISKS COVER
A GUIDE TO CYBER RISKS COVER Cyber risk the daily business threat to SMEs Cyber risks and data security breaches are a daily threat to everyday business. Less than 10% of UK companies have cyber insurance
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationHOW TO INSURE CYBER RISKS? Oulu Industry Summit
HOW TO INSURE CYBER RISKS? Oulu Industry Summit 2017 6.10.2017 Panu Peltomäki Liability and Financial Lines Practice Leader Marsh Oy Marsh A Leader in Quality, Scope, and Scale GLOBAL RISKS OF CONCERN
More informationCrawford Cyber Risk Services. A definitive solution for cyber-related events
Crawford Cyber Risk Services A definitive solution for cyber-related events CYBER-RELATED EVENTS An Increasing Threat Companies in all industries face an increasing threat of a cyber attack and cyber-related
More informationCyber Enhancement Endorsement
Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More informationCYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner
CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages
More informationELECTRONIC COMMERCE (E-COMMERCE)
POLICY NUMBER: BUSINESSOWNERS BP 05 94 01 06 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. ELECTRONIC COMMERCE (E-COMMERCE) This endorsement modifies insurance provided under the following:
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationHSB Cyber Insurance. Computer, data and cyber-risks insurance Policy document
Computer, data and cyber-risks insurance Policy document Contents Your contract with us 3 Important information 4 Headings and interpretation Your policy Your responsibility to give us correct information
More informationCyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist
Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More informationCyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby
Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC
More informationSurprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their
When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationCyber Liability Insurance. Data Security, Privacy and Multimedia Protection
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such
More informationCyber Security Liability:
www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111
More informationProperty business interruption Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationCyber Liability: New Exposures
Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders
More informationJAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)
More informationYou ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationCyber Insurance Policy
Cyber Insurance Policy CYBER LIABILITY INSURANCE POLICY In consideration of the premium once paid in full, the Underwriters and the Named Insured, on behalf of all Insureds, agree as follows: SECTION 1:
More informationClinic Business Continuity Plan Guidelines
Clinic Business Continuity Plan Guidelines Emergency Notification Contacts Primary Role Name Address Home Phone Mobile/Cell Phone Clinic Business Continuity Plan Coordinator EMR Vendor Business Continuity
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationCyber Risks A Reinsurer s Perspective on Exposure & Claims. EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier
Cyber Risks A Reinsurer s Perspective on Exposure & Claims EMEA Claims Conference 2018, Rüschlikon, 6th 7th March, Anthony Cordonnier Cyber: a claims sprint through the last year (and a bit ) Source: wikipedia.org
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More informationProperty business interruption (technology) Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationPrivacy and Security Standards
Contents Privacy and Security Standards... 3 Introduction... 3 Course Objectives... 3 Privacy vs. Security... 4 Definition of Personally Identifiable Information... 4 Agent and Broker Handling of Federal
More informationTrends in Cyber-Insurance Coverage to Meet Insureds Needs
Trends in Cyber-Insurance Coverage to Meet Insureds Needs Linda Wendell Hsu Selman Breitman LLP 33 New Montgomery Street, Sixth Floor San Francisco, CA 94105 (415) 979-0400 lhsu@selmanlaw.com William A.
More informationHIPAA SECURITY RISK ANALYSIS
HIPAA SECURITY RISK ANALYSIS WEDI National Conference May 18, 2004 Presented by: Lesley Berkeyheiser, The Clayton Group Andrew H. Melczer, Ph.D., ISMS Presentation Overview Key Security Points Review Risk
More informationSECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations
! SECURITY POLICY This Security Policy ( Policy ) applies to all Services provided by Collective Medical Technologies, Inc. ( CMT ) pursuant to a Master Subscription Agreement ( Underlying Agreement )
More informationLIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE
I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing
More informationDATA COMPROMISE COVERAGE FORM
DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout
More informationLargest Risk for Public Pension Plans (Other Than Funding) Cybersecurity
Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only
More informationNAIC BLANKS (E) WORKING GROUP
NAIC BLANKS (E) WORKING GROUP Blanks Agenda Item Submission Form DATE: 0//0 CONTACT PERSON: Sara Robben TELEPHONE: 8-8-80 EMAIL ADDRESS: srobben@naic.org ON BEHALF OF: NAME: Commissioner Mike Chaney FOR
More informationDoes it pay to be cyber-insured
Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks Key issues Where do insurance
More informationMANAGING DATA BREACH
MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses
More informationDATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE
More informationProperty Performance Policy Summary of 2017 Coverage Enhancements
AIG s Property Performance provides advanced, broad, all-risk property damage and business interruption coverage for midsize risks in a concise form. Recently enhanced with broadened coverages including
More informationProperty business interruption (charity and not for profit) Policy wording
Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business
More informationTerms and Conditions Cyber Enterprise Risk Management Insurance
Terms and Conditions Cyber Enterprise Risk Management Insurance Cyber Enterprise Risk Management Insurance Relationship of the Insurer, the Policyholder and the Insured in connection with Cyber Enterprise
More informationaustralia Canada ireland israel united kingdom United states Rest of world cfcunderwriting.com
australia Canada ireland israel united kingdom United states Rest of world CYBER PRIVATE ENTERPRISE policy document cfcunderwriting.com 1 PREAMBLE This Policy is a contract of insurance between you and
More informationManaging E-Commerce Risks
Managing E-Commerce Risks, Chartered Insurer ACII (UK), CPCU (USA), ARe (USA), ARM (USA), FIII (India). MBA Email: manoj@einsuranceprofessional.com E-Commerce and Risk Management E-Commerce is the delivery
More informationVirus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions
Virus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions Total Internet Protection Plan Summary: Identity Theft Coverage and Virus Protection Coverage is aggregately valued
More informationWhen The Wind Blows: Renewable Energy Risk Management Strategies
When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and
More informationClaims Made Basis. Underwritten by Underwriters at Lloyd s, London
APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds
More informationAdd our expertise to yours Protection from the consequences of cyber risks
CyberEdge THIS INFORMATION IS INTENDED FOR INSURANCE BROKERS AND OTHER INSURANCE PROFESSIONALS ONLY Add our expertise to yours Protection from the consequences of cyber risks What is CyberEdge? 2 CyberEdge
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationCOMMERCIAL CRIME PROTECTION INSURANCE Policy Summary
COMMERCIAL CRIME PROTECTION INSURANCE Policy Summary 2 Crime Insurance Policy Summary CRIME INSURANCE Policy Summary This policy is an annually renewable Commercial Crime Protection insurance underwritten
More informationTerrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What?
Terrorism, Zika, CBI - Business Operations Impacted Without Physical Damage? Now What? Introduction - Presenters Todd Cheema Senior Vice President Senior Structurer Innovative Risk Solutions Swiss Re Direct:
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationChurch and Cathedral Policy Changes Update Booklet
Church and Cathedral Policy Changes Update Booklet REFERENCE: CHANGES/V15/UKEIGCHURCH Important changes you should know about your insurance policy This document contains details of the changes we are
More informationCyber Liability A New Must Have Coverage for Your Soccer Organization
Cyber Liability A New Must Have Coverage for Your Soccer Organization Presented By: Pat Pullen Jeanne Zabuska President Underwriting Manager February 17, 2012 Why do you need Cyber Liability? Have a web
More informationCyber Liability State of the Insurance Market & Risk Update Sept 8, ISACA North Texas
Cyber Liability State of the Insurance Market & Risk Update Sept 8, 2016 ISACA North Texas Agenda Introduction Cyber Liability Overview State of Insurance Regulatory Update Questions and Discussion 2 Speakers
More informationCyber Risk Proposal Form
Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information
More informationHartford Steam Boiler (HSB) data security products for Commercial Lines.
Hartford Steam Boiler (HSB) data security products for Commercial Lines. Nationwide, together with HSB, offers data security insurance products that address several key data security exposures: Identity
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationSara Robben, Statistical Advisor National Association of Insurance Commissioners
Moderated by Daniel Eliot, Director Small Business Programs National Cyber Security Alliance Sara Robben, Statistical Advisor National Association of Insurance Commissioners Angela Gleason, Senior Counsel
More informationCyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor
Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April 2013 Cyber Risks Advisor 1 Contents Information Age Directive On Network and Information Security
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationComputer insurance section
Computer insurance section Contents of this section Meanings of defined terms 1 What is covered 3 Part 1 Computer equipment 3 Part 2 Reinstatement of data 4 Part 3 Increased cost of working 6 What is not
More informationTech and Cyber Claims Services
Tech and Cyber Claims Services Insurance Tech, Cyber Claims and our Breach Response Service The technology industry is a significant area of expertise for the Firm where we advise on contentious and non-contentious
More informationCYBER AND INFORMATION SECURITY COVERAGE APPLICATION
NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT
More informationCombined Liability Insurance for Financial Technology Companies Proposal Form
Combined Liability Insurance for Financial Technology Companies Proposal Form Important Notice 1. This is a proposal for a contract of insurance, in which the 'proposer' or 'you/your' means the individual,
More informationA FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015
APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK
More informationProfessional Indemnity and Cyber Insurance for Technology Companies Summary of cover
Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover Contents Introduction 2 Section 1: Professional Indemnity 2 Section 2: Cyber Insurance 2 Extensions that apply to your
More informationPolicy Changes Update Booklet
Policy Changes Update Booklet REFERENCE: CHANGES/V2/UKEIGCOM Important changes you should know about your insurance policy This document contains details of the changes we are making to our full suite
More informationFraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer
Fraud and Cyber Insurance Discussion Will Carlin Ashley Bauer Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and no organization is immune The changing business
More informationInsurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage
Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationAligning an information risk management approach to BS :2005
Interested in learning more about cyber security training? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written
More informationCYBER INSURANCE GUIDE
CYBER INSURANCE GUIDE cfcunderwriting.com OW EXP As we become increasingly reliant on technology, the potential impact of cyber-related incidents continues to grow. Yet the cyber insurance market is relatively
More informationCyber Liability Launch Event Moscow
Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers
More informationCyber-insurance General terms and conditions
Cyber-insurance General terms and conditions KY 01 Insurance terms and conditions 1 April 2017 330867e 07.17 1. Cyber-insurance 1.1 Structure of insurance The insurance includes liability (LIAB) and business
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationThe Internet of Everything: Building Cyber Resilience in a Connected World
The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver
More informationSecondary Professional Liability Insurance Program (SPLIP) Questions & answers
Secondary Professional Liability Insurance Program (SPLIP) Questions & answers March 2018 Q. Why was this program set up? A. The provincial and territorial engineering regulators are responsible for the
More informationTERMS 1. OUR PRODUCTS AND SERVICES 2. INFORMATION SERVICES 3. INSTALLED SOFTWARE
TERMS These Terms govern your use of the Clarivate Analytics products and services in your order form. We, our and Clarivate means the Clarivate entity identified in the order form and, where applicable,
More informationUntangling the Web of Cyber Risk: An Insurance Perspective
Untangling the Web of Cyber Risk: An Insurance Perspective BCAW: May 16 th, 2017 Gregory Eskins National Cyber Practice Leader gregory.eskins@marsh.com http://funpicc.blogspot.ca/2011/04/your-password-is-incorrect-will-ferrell.html
More informationA MUST-HAVE GUIDE TO OUR SPECTRUM COVERAGES AND LIMITS.
A MUST-HAVE GUIDE TO OUR SPECTRUM COVERAGES AND LIMITS. Delivering the broad property and liability coverage that businesses need is what The Hartford has done for decades. We continue to advance our Spectrum
More informationWould Your Company s Insurance Cover a Cyberattack? 1
ABA Section of Litigation 2012 Insurance Coverage Litigation Committee CLE Seminar, March 1-3, 2012: Insurance coverage for data breaches, denial of service attacks, and cybersecurity events Would Your
More informationHEALTHCARE BREACH TRIAGE
IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards
More informationAllocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications
Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications Presented by: Selena J. Linde George Galt Aaron Coombs June 23, 2016 Perkins Coie LLP Presenter:
More informationForm #CYBER-100 (Rev. Nov 6, 2017) Cyber Liability Claims Made and Reported
Form #CYBER-100 (Rev. Nov 6, 2017) Cyber Liability Claims Made and Reported PLEASE READ CAREFULLY - THIS IS A CLAIMS-MADE AND REPORTED POLICY WITH ALL DEFENCE COSTS INCLUDED WITHIN THE LIMIT OF LIABILITY.
More informationPolicy Document. 01 July Underwritten by Lombard Insurance Company Limited, an Authorised Financial Services Provider (FSP 1596).
01 July 2017 Policy Document Underwritten by Lombard Insurance Company Limited, an Authorised Financial Services Provider (FSP 1596). 28 Fricker Road, Illovo, Johannesburg www.leppard.co.za Tel: +27 11
More information2015 EMEA Cyber Impact Report
Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk
More informationFAQ. Secondary Professional Liability Insurance Program (SPLIP) for Canadian Engineers and Geoscientists. NEW! As of March 31, 2018
FAQ Secondary Professional Liability Insurance Program (SPLIP) for Canadian Engineers and Geoscientists How do I report a claim and to whom? For immediate verbal notice of the claim and to request a CLAIMS
More informationXL SPECIALTY INSURANCE COMPANY
DESIGN PROFESSIONAL GROUP 100 Yonge Street, Suite 1200 Toronto, ON M5C 2W1 DECLARATIONS POLICY NUMBER DPX 9449143 For purposes of the Insurance Companies Act (Canada), this document was issued in the course
More information