A Survey on the Current State of Hotel Security

Size: px
Start display at page:

Download "A Survey on the Current State of Hotel Security"

Transcription

1

2 Executive Summary In the hotel/hospitality sector, a positive guest experience can mean return stays and a good reputation. On the other hand, a negative experience can have both financial and legal repercussions. Security can play a huge role in this experience, although most actions are transparent to the guest. This is by design: hotels want their guests to be concerned with the purpose of their visit, not about their personal security or the security of their belongings. This survey was designed to help identify some of the industry s most significant security challenges and to provide insight into current security practices and trends. The unfortunate truth, however, is that the industry is subject to a host of traditional and emerging risks, which if not anticipated and addressed may put guests, employees, and belongings at risk. Vulnerabilities may include threats such as assaults and theft, as well as new threats such as identity theft and cyber-attacks. According to Mr. Chad Callaghan, Principal for Premises Liability Experts, LLC, More recently, especially at international and larger, urban hotels, security has actually become more visible as the threat of terrorism continues to be an issue. This survey was designed to help identify some of the industry s most significant security challenges and to provide insight into current security practices and trends. Some of these security trends, as identified by respondents, include the use of technology to reduce manpower, increased security presence, utilization of public/private sector surveillance, and outsourcing of security functions, among others. Survey Highlights This survey addresses security issues and trends across five categories: safety technology, surveillance, data security, physical safety, and personnel. The survey was divided into sections based on these categories. Highlights include: 27 percent of respondents have had door locks hacked into or attempted to be hacked into 92 percent of respondents use either magnetic stripe keycards (71 percent) or RFID proximity keycards (21 percent) 56 percent have upgraded their door lock systems within the past two years 27 percent have security personnel on duty 24/7 at all properties 88 percent currently use surveillance technology but only 36 percent have designated personnel actively monitoring it 71 percent keep surveillance videos for one month or less 67 percent purchase cyber liability insurance as part of their privacy and data security risk management program Legal Counsel is most frequently the department responsible for assuring compliance with state laws regarding privacy 87 percent have disaster response/business continuity (BCP) plans Although there is a growing trend in Europe to have a women s only floor for security purposes, none of the respondents of this U.S. focused survey have implemented this practice Page 1 Advisen Ltd.

3 Travelers expect their hotel rooms to be their sanctuary, a place where they can store their personal belongings and sleep without fear. Thefts and Assaults Respondents were asked to provide insight into the number of thefts and assaults that occurred at their facilities over the previous year. In response to the question How many reported room thefts have you recorded in the last year? (Including innkeepers) 47 percent said between 0 and 50, 24 percent said between 201 and 500, 18 percent said between 501 and 1000, 6 percent said between 51 and 200, 6 percent said more than 2001, and 0 percent said between 1001 and (Exhibit 1) Exhibit 1: Thefts within the last 12 months 18% 23% 0% 6% 6% 47% or more Respondents were also asked, Within the last 12 months how many reported assaults have occurred on the properties for which the company has direct accountability? 75 percent said between 0 and 4 assaults, 19 percent said between 5 and 19, 6 percent said that they had more than 20 assaults and zero percent said between 10 and 19. (Exhibit 2) Exhibit 2: Assault with the last 12 months 0% 6% 19% 75% More than 20 Safety Technology Doors Travelers expect their hotel rooms to be their sanctuary, a place where they can store their personal belongings and sleep without fear. A quality hotel room door and interior deadbolt are essential to providing this sense of security but technology also plays an increasingly important role. Page 2 Advisen Ltd.

4 There is likely a direct correlation between door lock hackings and the high percentage of door lock upgrades over the past couple of years. From automatic close and lock systems to highly sophisticated electronic keycards, hotel door safety technology has come a long way throughout the years. Although there are a variety of keycard locking systems such as mechanical hole cards, bar codes, wieg and wired embedded cards and smart cards among others, the vast majority of respondents said they use either magnetic stripe (71 percent) or RFID proximity cards (21 percent). In 2012, at the Black Hat security conference in Las Vegas, a security flaw in an electronic lock companies programmable key card locks was demonstrated. Cody Brocious, a Mozilla software developer discovered that hackers could gain access to millions of rooms using easily accessible hardware and a little programing know how. In an interview with Forbes, Brocious explained, It wouldn t surprise me if a thousand other people have found this same vulnerability and sold it to other governments. 1 Mr. Callaghan notes, that with the advancement of lock technologies, hotels should consider that upgrading to RFID will allow for more security so long as the lock and keycards employ advanced encryption better aimed at security. It was with this in mind that respondents were asked, Have your keycard locks ever been hacked into or attempted to be hacked into? Although the majority said No (73 percent), a comparatively high percentage (27 percent) responded Yes. Respondents were then asked, Have you upgraded your door lock systems in the past two years? 56 percent responded Yes, 25 percent said No and 19 percent did not know. (Exhibit 3) The fact that 19 percent of respondents do not know when they last upgraded their door lock systems highlights a risk that hotel owners should be concerned about. There is likely a direct correlation between door lock hackings and the high percentage of door lock upgrades over the past couple of years. According to Tom Ferguson, Vice President-Practice Leader, Casualty Risk Consulting at AIG, If this same question would have been asked five years ago the percentage of Yes responses would likely have been much lower. Exhibit 3: Have you upgraded your door lock systems in the past two years? 19% 25% 75% Yes No Don t know Page 3 Advisen Ltd.

5 One way to attempt to reduce the potential of privacy litigation is through proper storage and use once a surveillance video has been recorded. Surveillance Advancements in surveillance technology have proven valuable for both preventing and solving crime. Video surveillance played a huge role, for example, in identifying the individuals responsible for the bombing at the Boston marathon in So it is not surprising that the vast majority of respondents currently utilize technology. In response to the question, Do you utilize video surveillance technology? 88 percent responded Yes, 6 percent said No and 6 percent did not know. The use of surveillance technology, however, is not without risk. It can be perceived as an invasion of privacy and potentially increase the hotels exposure to liability. It was with this in mind that respondents were asked how they addressed video surveillance privacy concerns of guests and employees. Some of the most common responses included: Utilizing cameras in public areas only Following data privacy standards including signage and guest/employee notifications Keeping recordings for a limited amount of time (e.g. 30 days) Notify employees of use of surveillance in the employee handbook One way to attempt to reduce the potential of privacy litigation is through proper storage and use once a surveillance video has been recorded. Failure to establish and adhere to standards could unnecessarily expose a hotel to liability. For example, depending on the laws of a state, if a hotel who normally keeps a video for only a week decides to keep it for a longer period of time, it could increase their risk by conceivably having the video used against them in a case alleging invasion of privacy for circumventing their internal policy. Liability could potentially be attached because the video was not stored according to the hotel s standard business practice. 2 In general, the shorter the time the video is kept the less opportunity for privacy implications. Survey respondents seemed to agree. When asked, How long do you keep surveillance videos? 71 percent kept them for one month or less. (Exhibit 4) Exhibit 4: How long do you keep surveillance videos? 0% 0% 7% 7% 14% 7% 24 Hours One Week One Month One Quarter One Year More Than a Year Other (please specify) 65% Page 4 Advisen Ltd.

6 One reason many in the industry may choose not to utilize video surveillance technology is they may believe their liability will increase if cameras are installed without real-time dedicated monitoring and an immediate response to an incident. While shorter may generally be better, experts warn that other factors also need to be kept in mind when establishing a policy on surveillance video storage. According to Lance Ewing, IPG Leader, AIG, A rule of thumb, followed by some hotels for how long to keep surveillance videos is to keep them for the same amount of time the state allows for bodily injury suits. It is recommended facilities check with legal counsel regarding laws, including special obligations which may arise if litigation is reasonably foreseeable, and industry standards relating to this issue. Swimming Pools Installing surveillance cameras around the hotel pool, clubhouse, and cabanas can help provide security, monitor activity, and discourage bad behavior. It can also create privacy concerns and be a source of potential liability in bodily injury cases. With this in mind, respondents were asked, Do you use security cameras in swimming pool areas? Although the vast majority claims to utilize surveillance technology, far fewer use them in swimming pool areas with only 29 percent responding Yes and 71 percent responding No. Monitoring and Maintenance If actively monitored, surveillance cameras can allow for immediate response to an ongoing crime. This can prove an effective deterrent but also requires a substantial investment in security personnel costs. One reason many in the industry may choose not to utilize video surveillance technology is they may believe their liability will increase if cameras are installed without real-time dedicated monitoring and an immediate response to an incident. Mr. Callaghan notes, A hotel should first determine the purpose of surveillance at a particular location. If the reason is due to prior criminal activity in the area, then customers will likely have an expectation that the area is reasonably monitored and that security will respond if needed. This leads to the question: Do the benefits outweigh the risk? It appears more than half of respondents think so. When asked, Do you have designated personnel monitoring surveillance cameras 24/7? 36 percent said Yes, 57 percent said No and 7 percent did not know. While surveillance technology can pay huge dividends in hotel security, it can also lead to potential liability if the device is not properly operated and maintained. Respondents were asked, How often do you check video surveillance systems to make sure they are working properly? All of the respondents checked on a weekly basis at a minimum with 57 percent responding daily and 43 percent weekly. Outdated surveillance technology may be less effective and it may increase the potential for liability. Respondents were asked, When was the last time you upgraded surveillance technology at your properties? 43 percent said that they upgraded with the past one to three years, 36 percent said within the past year and 21 percent said within the past five to ten years. (Exhibit 5) Page 5 Advisen Ltd.

7 Information collected by hotels is not much different than information collected by retailers, who recently experienced some of the largest data breaches in history. Exhibit 5: When last upgraded surveillance technology More than 10 years ago 5-10 years 3-5 years 1-3 years Within the last year Data Security 0.0% 20.0% 40.0% 60.0% Within the last year 1-3 years 3-5 years 5-10 years More than 10 years ago Hotels are no longer only responsible for the safety of their guests and employees but also for protecting their personal identifiable information (PII). Information collected and stored from customers during the normal course of business such as names, addresses, and credit card numbers could be a potential gold mine for cyber-criminals. Information collected by hotels is not much different than information collected by retailers, who recently experienced some of the largest data breaches in history. Since those breaches there has been much discussion among retailers and financial institutions about moving away from the outdated and less secure magnetic stripe credit card to a more secure chip enabled card. Mr. Ewing explains, Hotels are using much of the same technology as retailers which may force them to have to change. Mr. Ferguson points to a San Diego Tribune article highlighting a recent partnership the AH&LA entered into with other organizations on cyber security.3 One of the organizations joining the partnership, the Retail Industry Leaders Association, stated in a press release that the new partnership will focus on improved information sharing, better card security technology and maintaining the trust of customers. The hospitality sector has been no stranger to significant and costly data breach events. According to Advisen data, the services sector (which includes hospitality) is more likely than any other sector to experience a cyber incident. Just recently for example, a hotel management and development company that manages over 150 hotels announced it is investigating a suspected credit/debit card breach. How an organization prepares and responds to a data-breach incident may influence the severity of the loss both from a financial and reputational risk perspective. With this in mind survey respondents were asked, What safeguards do you have in place to protect your customer s personal identifiable information (e.g. credit card, name, address etc.)? Some of the responses included: Using third party IT solutions Contractual provisions with vendors Internal policies around data and privacy protections Page 6 Advisen Ltd.

8 In the United States there is no all-encompassing law or regulatory body responsible for privacy and cyber security. Instead a patchwork of state and federal regulations focus on specific industries or populations, each with their own regulatory body. Employee training PCI compliance audits Management reviews and audits Use of encrypted software Implementation of a data breach response plan Respondents were asked whether or not they purchased cyber liability insurance as part of their privacy and data security risk management program. 67 percent responded Yes, 20 percent said No and 13 percent did not know. In the United States there is no all-encompassing law or regulatory body responsible for privacy and cyber security. Instead a patchwork of state and federal regulations focus on specific industries or populations, each with their own regulatory body. Respondents were asked, Who in your organization is responsible for assuring compliance with federal and state laws regarding privacy? 47 percent said General Counsel, 20 percent said IT, 13 percent Risk Management, 7 percent Compliance and 7 percent Internal Audit. (Exhibit 6) Exhibit 6: Who is responsible for compliance with federal and state privacy laws? Internal Audit Risk Management Compliance General Counsel IT General Counsel Compliance Risk Management Internal Audit IT 0.0% 20.0% 40.0% 60.0% In the past couple of years there has been much discussion over the opportunity costs associated with migrating IT functions to the cloud and whether the technology is more or less safe than storing it in-house. Answers to such questions have yet to be determined but will likely be on a case-by-case basis. However, with 53 percent of the respondents claiming that they have migrated IT functions to cloud it appears that in the hospitality industry the IT cost savings provided by the technology is proving hard to resist. Physical Safety The physical safety of hotel guests is arguably the most important responsibility of a hotel. Providing a safe environment not only reduces the potential for liability but is also important in maintaining a quality reputation. Employing security personnel at hotel properties is one way hotels can help ensure the safety of their guests. Respondents were asked, Do you have security personnel on duty 24/7 at all properties? 27 percent responded Yes, while 67 percent responded No and 7 percent did not know. (Exhibit 7) Page 7 Advisen Ltd.

9 Finally, regarding Exhibit 7: Use of Security other physical safety issues, 93 percent of respondents claimed to have emergency 66% 7% 75% Yes No Don t know lighting in all hotels. Effective preparation and training significantly increases the chances of a positive outcome in an emergency situation. In response to the question, Do you have a disaster response/business continuity (BCP) plan? 87 percent responded Yes and 13 percent responded No. Those who responded yes were then asked, Have you provided training to company personnel on the BCP? 83 percent said that they did. Mr. Ferguson believes the above stats identify some key risk concerns, In this day and age for a company not to have a BCP in place, or to have a BCP but not train personnel on it, significantly increases their reputational, economic, and organizational risk. With all the security challenges associated with running a hotel, respondents were asked, What security issues keep you up at night? The most common response was an active shooter on one of their premises. But how many of the respondents are actually prepared to respond if this were to occur? In response to the question, Does your company have an active shooter (AS) crisis response plan? 60 percent said Yes, 33 percent No and 7 percent did not know. Those who responded yes were then asked, Have you provided training to employees on Active Shooter crisis response? 82 percent said Yes. Finally, regarding other physical safety issues, 93 percent of respondents claimed to have emergency lighting in all hotels. None of the respondents claim to have a women s only floor, which is becoming increasingly commonplace in European hotels. Personnel To create an environment where guests feel safe and their personal belongings are secure, the focus should not be only on external threats but also on those from within. Far too frequently room thefts come from those trusted with access and data breaches come from an insider, sometimes by accident but often with malicious intent. Implementing personnel procedures that help to identify the background and habits of prospective and current employees can serve as a front line defense. Page 8 Advisen Ltd.

10 Respondents also were asked, How frequently do you provide OSHA training? and 40 percent said Annually, In response to the question, Do you conduct criminal background checks on prospective employees? all respondents said they conduct background checks at least periodically, 53 percent said always and 47 percent said Sometimes. Respondents were also asked if they conduct drug tests on their employees. 40 percent said Always, 33 percent said Sometimes and 27 percent said that they never perform drug tests. (Exhibit 8) Union rules could have an impact on the frequency of testing on employees. Exhibit 8: Frequency of Employee Drug Testing 27 percent Monthly, 13 percent As Needed and 7 percent Quarterly. 27% 33% 40% Always Sometimes Never Employees are also entitled to go to work on a daily basis in an environment free of discrimination and violence and under safe working conditions. In response to the question, How frequently do you provide HR training (i.e. discrimination, diversity, workplace violence, ethics etc.)? the majority (60 percent) said Annually, followed by 27 percent who responded As Needed, and 7 percent who said both Quarterly and Bi-annually. Respondents also were asked, How frequently do you provide OSHA training? and 40 percent said Annually, 27 percent Monthly, 13 percent As Needed and 7 percent Quarterly. Conclusion This survey provides an indication of the attitudes and practices currently surrounding hotel security. While this survey does not address every conceivable risk or exposure facing hotel owners, future surveys may address trends such as access control, patrol documentation, meth labs, and legionella. Other areas of concern to hotels is the use of third parties providing higher risk activities on site such as; parasailing, jet skis, adventure outings, etc. Subsequent surveys may provide stronger readings on trends in these important areas. Based on the finding of this survey hotel owners should consider ensuring all levels of management and security are knowledgeable and operating on the same page, including franchisee operations. Hotels consider taking a closer look at those questions were respondents answered No or Do Not Know Advancements in technology not only create more exposures but also play an increasingly important role in the response The development of programs e.g. BCP, etc. are only as good as the effective implementation and training of all staff into their purpose and proper response Page 9 Advisen Ltd.

11 Criminal activities including, but not limited to assaults, thefts, methamphetamine cooking, and data privacy hacking are all areas of concern for hotel owners, management companies and hotel loss prevention professionals Any questions can be directed to Lance Ewing, Industry Practice Group Leader, AIG: or Tom Ferguson, Vice President- Practice Leader, Casualty Risk Consulting at AIG: About the Survey and the Respondents Advisen Ltd and AIG worked together on a survey designed to gain insight into the current state and ongoing trends in hotel security.. Invitations to participate were distributed to 80 risk managers, loss prevention/security and other risk professionals in the hospitality sector. Respondents were identified as hotel operators only and did not include hotels with gaming or other recreational operations (e.g. cruise ships). The survey had an above average response rate of 21 percent, well above the average for similar risk management surveys conducted by Advisen. The majority of respondents (63 percent) classified themselves as Chief Risk Managers/Head of Risk Management Departments, followed by Head of Hotel Security/Loss Prevention at 25 percent, Member of Risk Management Department (not head) at 6 percent and Environmental Health and Safety Staff also at 6 percent. Nearly three fourths of the respondents (73 percent) own less than 50 properties, 13 percent own less than 100 properties and 13 percent own more than 250 properties. 53 percent of respondents also have franchised properties. Of those 53 percent, 78 percent have 50 or fewer franchised properties while 22 percent have more than 250. NOTES 1 Andy Greenberg, Forbes, Hacker Will Expose Potential Security Flaw in Four Million Hotel Room Keycard Locks, (July 2012), Law Offices of Stimmel, Stimmel & Smith, Video Surveillance Tapes: Access to Them and Privacy Issues under California Law, Katherine Poythress, U~T San Diego, New payment security partnership, (February 13, 2014), news/2014/feb/13/banks-retailers-cybersecurity-partnership/ 2 Law Offices of Stimmel, Stimmel & Smith, Video Surveillance Tapes: Access to Them and Privacy Issues under California Law, 3 Katherine Poythress, U~T San Diego, New payment security partnership, (February 13, 2014), utsandiego.com/news/2014/feb/13/banks-retailers-cybersecurity-partnership/ Page 10 Advisen Ltd.

12

T A B L E of C O N T E N T S

T A B L E of C O N T E N T S INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London SECTION I. GENERAL INFORMATION 1. Name of Applicant: Physical Address: (as it should appear

More information

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London APPLICATION for: NetGuard Plus Claims Made Basis. Underwritten by Underwriters at Lloyd s, London tice: The Policy for which this Application is made applies only to Claims made against any of the Insureds

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Cybersecurity Insurance: The Catalyst We've Been Waiting For SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons

More information

SPEC IAL REPO RT. Information Security and Cyber Liability Risk Management

SPEC IAL REPO RT. Information Security and Cyber Liability Risk Management SPEC IAL REPO RT Information Security and Cyber Liability Risk Management The Fourth Annual Survey on the Current State of and Trends in Information Security and Cyber Liability Risk Management October

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

CIRMA. Security Surveillance: Managing the Use of CCTV

CIRMA. Security Surveillance: Managing the Use of CCTV CIRMA Many municipalities and schools have increased their use of video surveillance to increase security, but they must ensure they adhere to statutory requirements Security Surveillance: Managing the

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

Ball State University

Ball State University PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1 What is

More information

Cybersecurity Insurance: New Risks and New Challenges

Cybersecurity Insurance: New Risks and New Challenges SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes

More information

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute),

This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), This article has been published in PLI Current: The Journal of PLI Press, Vol. 2, No. 2, Spring 2018 ( 2018 Practising Law Institute), www.pli.edu/plicurrent. PLI Current The Journal of PLI Press Vol.

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

2018 Small Business Risk Report

2018 Small Business Risk Report 2018 Small Business Risk Report Key findings The 2018 Small Business Risk Report reveals that while small business owners are aware they face multiple risks and growing concerns, they often are not spending

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only

More information

Strategic Security Management: Risk Assessments in the Environment of Care. Karim H. Vellani, CPP, CSC

Strategic Security Management: Risk Assessments in the Environment of Care. Karim H. Vellani, CPP, CSC Strategic Security Management: Risk Assessments in the Environment of Care Karim H. Vellani, CPP, CSC Securing the environment of care is a challenging and continual effort for most healthcare security

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

SPECIAL CONSIDERATIONS FOR SECURING CRITICAL MASS EVENTS AND ATTRACTIONS

SPECIAL CONSIDERATIONS FOR SECURING CRITICAL MASS EVENTS AND ATTRACTIONS SPECIAL CONSIDERATIONS FOR SECURING CRITICAL MASS EVENTS AND ATTRACTIONS Presented By: Michael Amaro - Prindle Law James Eiler - Kaiser, Swindells & Eiler MICHAEL L. AMARO FOUNDING PARTNER PRINDLE, AMARO,

More information

Your Guide to Business Asset Protection

Your Guide to Business Asset Protection Your Guide to Business Asset Protection Imagine finding yourself on the wrong end of a costly judgment in a lawsuit. Or re-building your business after a destructive natural disaster. Potentially worse,

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen

Cyber COPE. Transforming Cyber Underwriting by Russ Cohen Cyber COPE Transforming Cyber Underwriting by Russ Cohen Business Descriptor How tall is your office building? How close is the nearest fire hydrant? Does the building have an alarm system? Insurance companies

More information

EQUIFAX AFTERMATH ONE YEAR LATER. id theftcente r.o r g

EQUIFAX AFTERMATH ONE YEAR LATER. id theftcente r.o r g EQUIFAX ONE YEAR LATER AFTERMATH R E P O RT Ξ 2018 id theftcente r.o r g 1-8 8 8-40 0-5 5 3 0 A little over one year ago, Equifax announced one of the largest data breaches in history in which approximately

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

The Guide to Budgeting for Insider Threat Management

The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

The Internet of Everything: Building Cyber Resilience in a Connected World

The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Everything: Building Cyber Resilience in a Connected World The Internet of Things (IoT) is everywhere, ushering in a technological revolution at lightning speed. According to an Oliver

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,

More information

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY. October Sponsored by:

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY. October Sponsored by: CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2014 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe collaborated with Advisen to conduct a comprehensive market survey

More information

Construction. Industry Advisor. Fall Year end tax planning for construction companies. How to self-insure your construction business

Construction. Industry Advisor. Fall Year end tax planning for construction companies. How to self-insure your construction business Construction Industry Advisor Fall 2015 Year end tax planning for construction companies How to self-insure your construction business Cost segregation studies can benefit you and your clients Contractor

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

A New Era In Information Security and Cyber Liability Risk Management. A Survey on Enterprise-wide Cyber Risk Management Practices.

A New Era In Information Security and Cyber Liability Risk Management. A Survey on Enterprise-wide Cyber Risk Management Practices. SP ECIA L REPORT A New Era In Information Security and Cyber Liability Risk Management A Survey on Enterprise-wide Cyber Risk Management Practices October 2011 Sponsored by: A New Era In Information Security

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY

CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY October 2015 CYBER LIABILITY INSURANCE MARKET TRENDS: SURVEY Global reinsurer PartnerRe has once again collaborated with Advisen to conduct a comprehensive

More information

Risk Management in the Hospitality Industry:

Risk Management in the Hospitality Industry: Risk Management in the Hospitality Industry: Know When to Hold Em and Know When to Fold Em Presented by: Helaine S. Weissman, CPA, CHAE, Partner, PBMares Todd Swisher, CPA, CGMA, Partner, PBMares Topics

More information

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal

More information

2/13/2013 MANAGING A COMPLIANCE CRISIS: BE PREPARED! THE CASE FOR COMPLIANCE:

2/13/2013 MANAGING A COMPLIANCE CRISIS: BE PREPARED! THE CASE FOR COMPLIANCE: SCCE UTILITIES & ENERGY COMPLIANCE & ETHICS CONFERENCE February 26, 2013 Houston, TX MANAGING A COMPLIANCE CRISIS: BE PREPARED! BART SCHWARTZ, GUIDEPOST SOLUTIONS LLC. THE CASE FOR COMPLIANCE: Not all

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start Client Risk Solutions Going beyond insurance Risk solutions for Retail Start Partnering to Reduce Risk Retail companies compete vigorously to deliver superior service to customers with diverse and everchanging

More information

2015 EMEA Cyber Impact Report

2015 EMEA Cyber Impact Report Published: June 2015 2015 EMEA Cyber Impact Report The increasing cyber threat what is the true cost to business? Research independently conducted by Ponemon Institute LLC and commissioned by Aon Risk

More information

Vaco Cyber Security Panel

Vaco Cyber Security Panel Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

Cyber Risk Mitigation

Cyber Risk Mitigation Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

Crossing the Breach. It won t happen to us

Crossing the Breach. It won t happen to us Crossing the Breach P R O T E C T I N G F R O M D ATA B R E A C H E S I S M O R E T H A N A N I. T. I S S U E WHITE PA P E R V E S T I G E D I G I TA L I N V E S T I G AT I O N S Crossing the Breach It

More information

Commercial Insurance >

Commercial Insurance > Commercial Insurance AIG Commercial Insurance combines one of the world s farthest reaching property casualty networks with our diversified, multichannel distribution network to offer our customers a broad

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

INSURING CYBER RISKS WITH A CAPTIVE: IS IT WORTH IT?

INSURING CYBER RISKS WITH A CAPTIVE: IS IT WORTH IT? CAPSTONE ASSOCIATED SERVICES, LTD Two Post Oak Central 1980 Post Oak Blvd., Suite 1950 Houston, TX 77056. USA Telephone: 713.800.0550 Toll-Free: 1.800.705.4014 Fax: 713.623.0329 Website: www.capstoneassociated.com

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

Understanding Cyber Risk in the Dental Office. Melissa Moore Sanchez, CIC

Understanding Cyber Risk in the Dental Office. Melissa Moore Sanchez, CIC Understanding Cyber Risk in the Dental Office Melissa Moore Sanchez, CIC Data Breaches are Escalating Between February 5, 2005 and May 26, 2012 561,465,563 records containing sensitive personal information

More information

Personal Information Protection Act Breach Reporting Guide

Personal Information Protection Act Breach Reporting Guide Personal Information Protection Act Breach Reporting Guide If an organization determines that a real risk of significant harm exists to an individual as a result of a breach of personal information, section

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

HOTEL/MOTEL SUPPLEMENTAL APPLICATION

HOTEL/MOTEL SUPPLEMENTAL APPLICATION HOTEL/MOTEL SUPPLEMENTAL APPLICATION APPLICANT INFORMATION Name of Applicant: Years in Business: Years with same management: If someone, other than the applicant, will be managing the business, what prior

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start Client Risk Solutions Going beyond insurance Risk solutions for Real Estate Start Partnering to Reduce Risk Real estate owners, operators, managers and developers act vigorously to maintain profitability

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

Cyber Risks & Cyber Insurance

Cyber Risks & Cyber Insurance Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and

More information

CODE OF CONDUCT AND ETHICS OF URBAN OUTFITTERS, INC.

CODE OF CONDUCT AND ETHICS OF URBAN OUTFITTERS, INC. CODE OF CONDUCT AND ETHICS OF URBAN OUTFITTERS, INC. 6395160. 12 Introduction This Code of Conduct and Ethics (the Code ) of Urban Outfitters, Inc. and its subsidiaries ( URBN ) provides an ethical and

More information

Protecting Your Credit Union

Protecting Your Credit Union Protecting Your Credit Union A More Strategic Approach Fall 2011 As a credit union, you are strategic in everything you do. Matt Sweeney, MBA, AAI Credit Union Practice Leader 816.960.9181 msweeney@lockton.com

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

Healthcare Data Breaches: Handle with Care.

Healthcare Data Breaches: Handle with Care. Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice

More information

Property business interruption (technology) Policy wording

Property business interruption (technology) Policy wording Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business

More information

INJURY PREVENTION & PRE-LOSS CONTROLS A Paradigm Shift In Workers Compensation. October Sponsored by:

INJURY PREVENTION & PRE-LOSS CONTROLS A Paradigm Shift In Workers Compensation. October Sponsored by: & PRE-LOSS CONTROLS A Paradigm Shift In Workers Compensation October 2011 Sponsored by: INJURY PREVENTION & PRE-LOSS CONTROLS A Paradigm Shift In Workers Compensation Workers compensation was conceived

More information

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

IT Risk in Credit Unions - Thematic Review Findings

IT Risk in Credit Unions - Thematic Review Findings IT Risk in Credit Unions - Thematic Review Findings January 2018 Central Bank of Ireland Findings from IT Thematic Review in Credit Unions Page 2 Table of Contents 1. Executive Summary... 3 1.1 Purpose...

More information

Launching a Hedge Fund: 10 Keys to Success. from marketing to technology, the top tips for achieving startup success

Launching a Hedge Fund: 10 Keys to Success. from marketing to technology, the top tips for achieving startup success Launching a Hedge Fund: 10 Keys to Success from marketing to technology, the top tips for achieving startup success It may be a dream for most, but the desire to start a hedge fund is a real one for many

More information

PRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C.

PRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C. PRESENTERS Todd Seiders Director of Loss Control for Petra Risk Solutions oversees the risk management and claims departments for approximately 3400 hotels, resorts and spas nationwide extensive hands

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

What turns an accident into a lawsuit. A look inside the plaintiff s attorney s playbook

What turns an accident into a lawsuit. A look inside the plaintiff s attorney s playbook What turns an accident into a lawsuit A look inside the plaintiff s attorney s playbook The inefficient regulation of the Amusement Industry which includes travelling carnivals, water parks and huge theme

More information

September 14, Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc Peachtree Street, NE Atlanta, GA Dear Mr.

September 14, Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc Peachtree Street, NE Atlanta, GA Dear Mr. September 14, 2017 Richard F. Smith Chairman and Chief Executive Officer Equifax, Inc. 1550 Peachtree Street, NE Atlanta, GA 30309 Dear Mr. Smith: Consumers Union, the policy and mobilization division

More information

Combined Liability Insurance for Financial Technology Companies Proposal Form

Combined Liability Insurance for Financial Technology Companies Proposal Form Combined Liability Insurance for Financial Technology Companies Proposal Form Important Notice 1. This is a proposal for a contract of insurance, in which the 'proposer' or 'you/your' means the individual,

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start Client Risk Solutions Going beyond insurance Risk solutions for Financial Institutions Start Partnering to Reduce Risk Financial Institutions compete vigorously to maintain profitability and deliver superior

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

Insurance Buyers News

Insurance Buyers News Insurance Buyers News Springfield PO Box 4207, Springfield, MO 65808 Phone: 800-422-5275 417-887-3550 Fax: 417-887-3252 Rolla PO Box 1258, Rolla, MO 65402-1258 Phone: 800-364-2212 573-364-8888 Fax: 573-341-2257

More information

Property business interruption Policy wording

Property business interruption Policy wording Please read the schedule to see if your loss of income, loss of gross profit, increased costs of working or additional increased costs of working are covered or if a first loss limit or flexible business

More information

PA TURNPIKE COMMISSION POLICY

PA TURNPIKE COMMISSION POLICY POLICY POLICY SUBJECT: PA TURNPIKE COMMISSION POLICY This is a statement of official Pennsylvania Turnpike Policy RESPONSIBLE DEPARTMENT: NUMBER: 3.07 APPROVAL DATE: 07-23-2002 EFFECTIVE DATE: 08-07-2002

More information

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD SECURITY INCIENT RESPONSE PEACE OF MIN IN A CHANGING WORL The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,

More information

BETA*suite. Alternative Risk & Insurance Services

BETA*suite. Alternative Risk & Insurance Services BETA*suite Alternative Risk & Insurance Services Flexible, a la carte solutions to meet and exceed your changing healthcare risk management and risk financing needs Risk Management Consulting Excess Liability

More information

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016 Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions June 2016 Program Overview Regulatory Environment Who Needs a Privacy Program and Common Questions Components of a Comprehensive

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS CODE OF BUSINESS CONDUCT AND ETHICS The Board of Directors (the Board ) of Robert Half International Inc. (the Company ) has adopted the following Code of Business Conduct and Ethics (the Code ) for itself

More information

Up for Grabs: Taking Charge of Your Digital Identity

Up for Grabs: Taking Charge of Your Digital Identity Up for Grabs: Taking Charge of Your Digital Identity AARP Wisconsin Survey of Internet Users Age 18+ Report prepared by Karla Pak, Doug Shadel, and Alicia Williams August 2018 https://doi.org/10.26419/res.00228.022

More information

PRIVACY AND CYBERSECURITY ISSUES IN M&A TRANSACTIONS

PRIVACY AND CYBERSECURITY ISSUES IN M&A TRANSACTIONS PRIVACY AND CYBERSECURITY ISSUES IN M&A TRANSACTIONS Don Shelkey and Ezra Church May 22, 2018 2018 Morgan, Lewis & Bockius LLP Overview Introduction Why should I care? Five Key Legal Requirements Sector-Specific

More information

BETA*suite Alternative Risk & Insurance Services

BETA*suite Alternative Risk & Insurance Services BETA HEALTHCARE GROUP PARTNERS IN MANAGING RISK BETA*suite Alternative Risk & Insurance Services Flexible, a la carte solutions to meet and exceed your changing healthcare risk management and risk financing

More information

WORTH THE RISK? Highlights from the Chubb 2013 Private Company Risk Survey

WORTH THE RISK? Highlights from the Chubb 2013 Private Company Risk Survey WORTH THE RISK? Highlights from the Chubb Private Company Risk Survey TABLE OF CONTENTS TABLE OF CONTENTS Introduction: The Bottom Line: Private Companies Are Vulnerable... 3 1. GL is Only One Piece of

More information

FIDUCIARY LIABILITY Risk review performed for: Date:

FIDUCIARY LIABILITY Risk review performed for: Date: ForeFront Portfolio SM Risk Analyzer for Privately Held Companies FIDUCIARY LIABILITY Risk review performed for: Date: The Purpose of the Risk Analyzer When it comes to insuring your company, you can

More information

` Hospitality Legal Issues, HAMG 1340 COURSE INFORMATION LIFETYLE ARTS & DESIGN CAREERS

` Hospitality Legal Issues, HAMG 1340 COURSE INFORMATION LIFETYLE ARTS & DESIGN CAREERS HOTEL RESTAURANT MANAGEMENT PROGRAM HOSPITALITY LEGAL ISSUES ` HAMG 1340-second 8 weeks Fall 2012, CRN # 21672 Course Location: Online for on campus tests-jbw Building room 219 Course Semester Credit Hours:

More information

PAYMENT CARD INDUSTRY

PAYMENT CARD INDUSTRY DATA SECURITY POLICY Page 1 of 1 I. PURPOSE To provide guidelines and procedures to ensure that all money paid to the College in the form of cash, checks or payment cards is properly receipted, accounted

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION A. Please indicate the coverages, limits and deductibles desired on the chart below. APPLICANT NAME: NATIONAL

More information

Property Performance Policy Summary of 2017 Coverage Enhancements

Property Performance Policy Summary of 2017 Coverage Enhancements AIG s Property Performance provides advanced, broad, all-risk property damage and business interruption coverage for midsize risks in a concise form. Recently enhanced with broadened coverages including

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

Risk Management The Process & Concepts. Mitch Kenyon, ARM Municipal Insurance Association of British Columbia

Risk Management The Process & Concepts. Mitch Kenyon, ARM Municipal Insurance Association of British Columbia Risk Management The Process & Concepts Mitch Kenyon, ARM Municipal Insurance Association of British Columbia MIABC Owned & Governed by 170 BC Local Governments Commenced 1987 Governed by 15 Board 18 Staff

More information

TRAVEL CARD PROGRAM POLICY AND PROCEDURES. West Chester University

TRAVEL CARD PROGRAM POLICY AND PROCEDURES. West Chester University TRAVEL CARD PROGRAM POLICY AND PROCEDURES West Chester University 201 Carter Drive, Suite 200 West Chester, PA 19383 PURPOSE To establish a methodology for use and define the limits of the West Chester

More information

Trial by fire* Protected. But under pressure to perform

Trial by fire* Protected. But under pressure to perform Key findings from the 2010 Global State of Information Security Survey Financial Services Trial by fire* Protected. But under pressure to perform What global executives expect of information security In

More information