Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered?
|
|
- Ariel Carroll
- 5 years ago
- Views:
Transcription
1 Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered? Speakers : Edward M. Joyce, Partner, Jones Day Leslie Lamb, Director Global Risk Management, Cisco Systems, Inc.
2 The views expres s ed by the s peakers are not thos e of the s peaker s employer, firm, clients, or any other organization. The opinions expres s ed do not cons titute legal or ris k management advice. The views dis cus s ed are for educational purpos es only, and provided only for us e during this s es s ion.
3 Learning Objectives At the end of this s es s ion, you will: Identify and decipher relevant ins urance policies regarding privacy, hacking and IP claims Be prepared to develop a good paper trail for pres enting thes e claims Identify and addres s common pitfalls in pres enting cyber ins urance claims
4
5 Recent Cyber Attacks Oct 2016 Dyn Cyberattack DDoS causing major internet platforms and services to be unavailable to many in Europe and North America May Primera Blue Cross 11 million customers Feb 2015 Anthem tens of millions of customers and employees Nov 2014 Sony Pictures attack wiped clean internal DCs and led to cancellation of The Interview Sept 2014 Home Depot 56 million payment cards July/Aug 2014 JP Morgan Chase 83 million households and small businesses June 2014 Community Health Systems 4.5 million patient records April 2014 Michaels Stores 3 million customer payment cards stolen December 2013 Target 40 million credit and debit cards stolen and 70 million people affected by stolen PII
6 A Public Relations Nightmare Data breaches/cyber attacks become public Neiman Marcus (Jan 2014) Barnes & Noble (Oct 2012) Global Payments (Mar 2012) Zappos (Jan 2012) Sony s Playstation Network (Apr 2012) Michael Stores (May 2011) State attorneys general publicize breaches online Privacy advocates track and publicize breaches Litigation
7 Target Industries Targets of Opportunity Retail Hospitality Health Care Education Ongoing Targets Financial Services Technology Government Potential Targets? Energy Transportation Critical Infrastructure
8 RECENT DATA BREACHES Yahoo!, Inc. [September 2016] Yahoo admitted an unknown group hacked 500 million accounts in 2014 one of the largest number of user accounts hacked from a single website in history Verizon Enterprise Solutions [March 2016] Hackers stole contact information for 1.5 million customers AdultFriendFinder.com [October 2016] In an attack similar to the AshleyMadison attack, hackers stole data associated with 412 million accounts Jones Day
9 ANATOMY OF A DATA BREACH A major breach incident creates an immediate and urgent crisis similar to a natural disaster Requires decisive and coordinated action on several fronts with multiple constituencies Significant legal challenges include: Breach Notification Requirements Regulatory Investigations Class Action Litigation Insurance Coverage Jones Day
10 BREACH NOTIFICATION 47 out of 50 states require consumers to be notified if unencrypted Personal Information exposed. Some states also require notification to Attorney General. Personal Information is defined somewhat differently by the 50 states Generally includes a person s name in combination with other information that identifies a particular individual or permits contacting of an individual Jones Day
11 BREACH NOTIFICATION Decision must be made early, sometime under difficult circumstances Time to assess notice obligations? Risk of leaks or bloggers Factual or forensic uncertainty Decision has important ramifications Breach becomes public Increases costs Generates litigation and government involvement Jones Day
12 REGULATORY ENFORCEMENT Data breach can result in investigations by government agencies Federal, state, and foreign jurisdictions Government can issue subpoenas, demand documents, impose fines and penalties Claims include: Failure to implement sound security protocols Violation of company privacy policy Many states have data security statutes that require reasonable security procedures or other requirements Jones Day
13 REGULATORY ENFORCEMENT Federal Agencies Federal Trade Commission (FTC) Securities Exchange Commission (SEC) Department of Health and Human Services Office for Civil Rights (OCR) State Attorneys General Multi-state AG investigations -- common in major breaches Coordination between state/federal may not be optimal Jones Day
14 CLASS ACTION LITIGATION Breaches that involve customer or employee data often result in class action lawsuits Lawsuits typically allege: Company s negligent data security practices caused breach Injury to privacy rights due to release of personal information Heightened risk of identity theft Expenses for ID protection Company delay in notifying consumers Jones Day
15 CLASS ACTION LITIGATION Common Law Claims Statutory Claims Invasion of Privacy State Consumer Protection Statutes Negligent data security State Data Breach Acts Breach of contract / warranty Fraud / misrepresentation State Medical Privacy statutes Fair Credit Reporting Act Jones Day
16 CLASS ACTION LITIGATION Key legal issues include: Standing who sues for damages re data breach? out-of-pocket loss? Legal standard -- strict liability, negligence, something else? What are reasonable cybersecurity measures? Causation Can harm be traced to your breach? Defenses based on user agreement Waiver / Arbitration Clause Jones Day
17 BREACH COSTS/DAMAGES Response Costs Legal Claims Legal fees for breach response Forensic investigation Breach Notice ID protection/credit monitoring Class action defense costs and settlement Defense of government proceedings Government fines/penalties Card brand claims & assessments Business Losses Restoration of data Lost revenue/business interruption Extra expenses Reputational harm / loss of market share Jones Day
18 BREACH COSTS/DAMAGES Data breach costs continue to rise 2016 costs up 2.6% from 2015 costs Published estimates of average data breach costs vary Ponemon: $236 per compromised record (in the U.S.) Verizon : $0.58 per compromised record True costs will depend on certain key factors Degree of preparedness Personally Identifiable Information ( PII ) and disclosure requirements Class action litigation Market impact Insurance Coverage Jones Day
19 INSURANCE COVERAGE Major shifts insurance industry over the last decade Insurers broadened coverage under traditional insurance policies to provide some cyber protection during early days of the internet Today, insurers have reversed course Denying coverage under traditional insurance policies Adding exclusions and coverage limitations Marketing new forms of cyber insurance sets up a straw man Jones Day
20 CYBER INSURANCE COVERAGE Cyber Insurance policies cover five major categories of costs: Incident Response Coverage - cost of legal and forensic investigations, data restoration Privacy Notification Coverage - notice to customers, identity theft protection, credit monitoring Third-Party Liability Coverage - defense and settlement of claims alleging breach of data security or disclosure of PII Regulatory Coverage - defense and settlement of government claims and investigations First-Party Coverage - lost revenue and extra expense Jones Day
21 CYBER INSURANCE COVERAGE Cyber insurance market is not yet mature and policies may be inadequate Standard forms have not yet been developed. Policies are complex and have not yet been tested by the courts Policies are expensive and may require a high self-insured retention (SIR) Numerous exclusions that limit coverage Notification and consent requirements (for counsel, consultants, and major costs) create pitfalls for the uninformed policyholder Jones Day
22 Traditional Coverage for a Data Breach?? Property Insurance Crime Insurance/Fidelity Bond CGL Insurance Policies D&O/Professional Liability Insurance Policies
23 Lawsuits that Follow Data Breach/Invasion of Privacy Invasion of privacy Negligence and other tort claims Breach of contract Enforcement actions by federal regulators Actions by State Attorneys General Can res ult in (1) s ubs tantial defens e cos ts ; and (2) pos s ible damages /s ettlements 23
24 Coverage for the Follow-on Lawsuits -- Data Breach/Invasion of Privacy Commercial General Liability (CGL) Errors and Omissions (E&O) Liability Directors and Officers (D&O) Liability Cyber Liability/Data Breach Policies
25 Traps to Avoid First Party Property Policies Notice of loss Proof of loss When and how? At the Company s request? Partial Proof/interim payment Suit limitation clause Tolling agreement/waiver
26 Traps to Avoid - Liability Policies Notice Give notice as soon as practicable v. immediately; but give notice of what? Notice of claim/notice of circumstances to lock in a specific policy period (typically claims made policies) Cooperation Clause/Claims Management What should you be sending the insurer? Insurance Company Consent/Approval For expenses, defense costs and settlements Is it in writing?
27 Insurance Policy Conditions Traps to Avoid Notice is not like wine, it does not get better with age!
28 What Triggers the First Party Property Policies for Data Breaches? First Party Property Policies Direct physical loss of or damage to property Exclusions: computer data -- in or out? Date of discovery -- Crime Insurance/Fidelity Bond 6th Circuit decision in DSW Inc. (Aug 2012) Note: does your policy specifically include coverage?
29 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? CGL Policies Bodily Injury and Property Damage Personal and Advertising Injury Oral or written publication, in any manner, of material that violates a person's right of privacy Covered Offense Invasion of Privacy During the Policy Period Publication
30 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? Claims-Made Policies D&O, E&O/Professional Liability Breadth of your D&O entity coverage Private company v. public company: what are the differences?
31 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? Claims-Made Policies (cont.) Breadth of "Claim" definition - What is included? FTC action/proceeding? What kind? Subpoena? Investigations? "Wrongful Act" definition -- error, omission and/or act; does it need to be negligent? "Loss" Definition -- does the definition list specific ins and outs?
32 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? Claims-Made Policies (cont.) Breadth of exclusions -- willful, malicious and/or criminal acts? Whose willful, malicious and/or criminal acts? Interrelated claims/interrelated wrongful acts -- Where does this claim go? Whose policy is triggered? Tension between interrelated claims/wrongful acts, Claim definition, exclusions and notice
33 INSURANCE TAKEAWAYS Insurers appear to be paying cyber claims for now Market is growing while insurers compete for market share Opportunities for policyholders to improve coverage through smart and focused approach during renewal process Understand your existing policy and its limitations Understand which terms matter most in the event of a breach Seek targeted changes that will enhance coverage Jones Day
34 INSURANCE TAKEAWAYS Cyber and data breach claim require proactive insurance strategy with early engagement. Initial action should include: 1. Review relevant policies and develop strategic plan which policies apply, what losses are covered, what steps must be taken 2. Integrate insurance strategy into overall response efforts 3. Identify and track breach-related costs 4. Maintain active, ongoing communication with insurers 5. Added: Maintain active communication with your internal CISO and/or IT Organization
35 Questions?
36
CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING
CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,
More informationChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them
ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of
More informationThe Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage
The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT
More informationAon Cyber Risk and Directors & Officers Forum CRM011
Aon Cyber Risk and Directors & Officers Forum CRM011 Speakers: Leslie Lamb, Director, Global Risk & Resiliency Management, Cisco Systems Timothy Fletcher, Senior Vice President and Team Leader, Aon Risk
More informationCyber & Privacy Liability and Technology E&0
Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationCYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY
CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention
More informationLargest Risk for Public Pension Plans (Other Than Funding) Cybersecurity
Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only
More informationDATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE
More informationWe re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber
We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber Protection Data Creates Duties What data do you access, and
More informationCYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP
CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional
More informationTHE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM v Anderson Kill P.C. All Rights Reserved.
THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM 1 Allen Wolff Shareholder, Anderson Kill Insurance Lawyer Construction Lawyer Trial Lawyer 2 Disclaimer The views expressed by the
More informationTrends, Vendor Management, and Practical Tips For In House Counsel. ACC National Capital Region October 16, 2018
Cyberinsurance Issues Coming for 2019 Trends, Vendor Management, and Practical Tips For In House Counsel ACC National Capital Region October 16, 2018 Scott N. Godes Partner Insurance Recovery Co-Chair,
More informationMedGuard. The ProAd. The Coverage You Need. Coverage for the Legal Expenses of Defending Against Administrative Proceedings
is a defense provided by is a defense provided by Defense Coverage for medguard The Extra Protection You Need A basic professional liability policy pays the costs of defending and indemnifying you against
More informationCyber/Privacy Coverage
Cyber/Privacy Coverage COVERAGE REVIEW COVERAGE ISSUE COVERAGE GRANTS Third Party Coverage Options Network Security Liability Privacy Liability Professional Liability Technology E&O Website Media Liability
More informationCyber breaches: are you prepared?
Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do
More informationDirectors & Officers Insurance 101
Directors & Officers Insurance 101 The outlines of coverage used throughout this presentation are not intended to express any legal opinion as to the nature of coverage. They are only intended to provide
More informationFive Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims
Five Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims By Andrew M. Reidy, Joseph M. Saka and Ario Fazli Lowenstein Sandler Companies spend hundreds of millions of dollars annually to
More informationDATA COMPROMISE COVERAGE FORM
DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout
More informationAnatomy of a Data Breach
Anatomy of a Data Breach May 17, 2017 Lucie F. Huger Officer, Greensfelder, Hemker & Gale, P.C. Mary Ann Wymore Officer, Greensfelder, Hemker & Gale, P.C. Information is the New Oil! Companies are collecting
More informationCyber Risk Insurance. Frequently Asked Questions
Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy
More informationCyber Risks & Cyber Insurance
Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and
More informationCyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby
Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC
More informationYou ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017
You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business
More informationPRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C.
PRESENTERS Todd Seiders Director of Loss Control for Petra Risk Solutions oversees the risk management and claims departments for approximately 3400 hotels, resorts and spas nationwide extensive hands
More informationCybersecurity Privacy and Network Security and Risk Mitigation
Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st
More informationInsurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage
Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central
More informationCyber Risk & Insurance
Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective
More informationCyber Enhancement Endorsement
Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?
More informationMANAGED CARE ERRORS AND OMISSIONS COVERAGE ENDORSEMENT FIDUCIARY COVERAGE SECTION E1855MBG-0309
MANAGED CARE ERRORS AND OMISSIONS COVERAGE ENDORSEMENT FIDUCIARY COVERAGE SECTION E1855MBG-0309 In consideration of the premium charged, it is hereby understood and agreed that FIDUCIARY COVERAGE SECTION
More informationCyber Security Liability:
www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111
More informationCredit Card Data Breaches: Protecting Your Company from the Hidden Surprises
Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,
More informationThe Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions
The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions Our Speakers Mark Melodia is Partner and Co-Head of the Global Data Security, Privacy & Management
More informationWhen The Wind Blows: Renewable Energy Risk Management Strategies
When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and
More informationCyber Risk Management
Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance
More informationCyberRisk: What we know and what we don't know
CyberRisk: What we know and what we don't know JOHN MULLEN, ESQ., LEWIS BRISBOIS BISGAARD & SMITH LLP ADAM COTTINI, ARTHUR J GALLAGHER MARCH 16, 2016 2014 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS
More informationPaul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP
HOW TO NAVIGATE THE LANDSCAPE OF GLOBAL PRIVACY AND DATA PROTECTION Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP Topics to Cover General Concepts Increased U.S. enforcement activity
More informationChubb Cyber Enterprise Risk Management
Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen
More information503 SURVIVING A HIPAA BREACH INVESTIGATION
503 SURVIVING A HIPAA BREACH INVESTIGATION Presented by Nicole Hughes Waid, Esq. Mark J. Swearingen, Esq. Celeste H. Davis, Esq. Regional Manager 1 Surviving a HIPAA Breach Investigation: Enforcement Presented
More informationCyber Security & Insurance Solution Karachi, Pakistan
March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background
More informationJAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group
SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)
More informationAn Overview of Cyber Insurance at AIG
An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product
More informationCritical Issues in Cybersecurity:
Critical Issues in Cybersecurity: Are you prepared and in compliance? July 27, 2017 Robert Barbarowicz Scott Lyon JillAllison Opell 1 What Types of Information do We Collect? PII v. PHI v. NPI v. sensitive/confidential
More informationCYBER LIABILITY REINSURANCE SOLUTIONS
CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber
More informationSafeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker
Safeguarding Your HIPAA and Personal Health Information Data Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker 1 Overview» Patient information confidentiality Grant requirements
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationInsurance Buyers News
Insurance Buyers News Springfield PO Box 4207, Springfield, MO 65808 Phone: 800-422-5275 417-887-3550 Fax: 417-887-3252 Rolla PO Box 1258, Rolla, MO 65402-1258 Phone: 800-364-2212 573-364-8888 Fax: 573-341-2257
More informationEvaluating Your Company s Data Protection & Recovery Plan
Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart
More informationSolving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017
Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber
More informationCyber Liability Insurance for Sports Organizations
Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media
More informationSummary Comparison of Current Senate Data Security and Breach Notification Bills
Data Security reasonable Standards measures Specific Data Security Requirements Personal Information Definition None (a) First name or (b) first initial and last name, in combination with one of the following
More informationSkyAngelGPS Monthly Purchase and Services Agreement
SkyAngelGPS Monthly Purchase and Services Agreement This Agreement is made this day of, 20 by and between Assistive Technology Services LLC. Dealer and (CUSTOMER) Purchaser (Subscriber) Information: (Person
More informationCyber-Insurance: Fraud, Waste or Abuse?
SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major
More informationWhat Solo and Small Firms Need to Know about Malpractice Insurance
What Solo and Small Firms Need to Know about Malpractice Insurance Insurance Considerations 2 Greg Cooke Sales Manager USI Affinity Practice 360 - A Day for Lawyers & Law Firms May 6, 2016 2 Agenda 3 Where
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationHEALTHCARE INDUSTRY SESSION CYBER IND 011
HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,
More informationAt the Heart of Cyber Risk Mitigation
At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying
More informationIS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE
IS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE THOMAS H. BENTZ, JR.* I. INTRODUCTION The last several years have taught many banks that
More informationProtecting Against the High Cost of Cyberfraud
Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4
More informationVenture Capital Private Equity
Quick Reference Guide Zurich Asset Investment Managers Insurance Venture Capital Private Equity Zurich Insurance Solution (Venture Capital - Private Equity) has been updated and given a new name Zurich
More informationPrivate Investment Fund Liability Insurance Management and Professional Liability Coverage Part
I. Insuring agreements We will pay loss in excess of any applicable retention resulting from claims against you for a wrongful act as follows, provided the claim is first made against you and reported
More informationCybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do
ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction
More informationHEALTHCARE BREACH TRIAGE
IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards
More informationLiability Insurance: Top Ten Facts Every In-House Counsel Should Know
Liability Insurance: Top Ten Facts Every In-House Counsel Should Know Presentation for Association of Corporate Counsel Presented by Osborne & Nesbitt LLP Top Ten Facts 1. Claims Typically Covered 2. Occurrence
More informationCyber Incident Response When You Didn t Have a Plan
Cyber Incident Response When You Didn t Have a Plan April F. Doss Saul Ewing LLP How serious is the cybersecurity threat? Some sobering numbers from 2015: Over half a billion personal records were stolen
More informationCyber Exposures: The Importance of Risk Identification and Transfer. Presented By: Joe Weipert
Cyber Exposures: The Importance of Risk Identification and Transfer Presented By: Joe Weipert The Complexity of Cyber Risk and its Severity My Goal Today: Getting Your Attention in 30 Minutes Average Claim
More informationSelf-Defense Liability Coverage Form
USCCA SELF-DEFENSE SHIELD MEMBERSHIP BENEFIT Self-Defense Liability Coverage Form SILVER GOLD PLATINUM ELITE $300,000 $600,000 $1,150,000 $2,250,000 in Self-Defense SHIELD Protection in Self-Defense SHIELD
More informationEMPLOYEE BENEFITS LIABILITY COVERAGE
POLICY NUMBER: COMMERCIAL GENERAL LIABILITY CG 04 35 12 07 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT PROVIDES CLAIMS-MADE COVERAGE.
More informationWhat is a privacy breach / security breach?
What is a breach? What is a privacy breach / security breach? Privacy breach Computer security breach: The theft, loss or unauthorized disclosure of personally identifiable non-public information (PII)
More informationCyber Insurance 2017:
Cyber Insurance 2017: Ensuring Your Coverage is Sound Thursday, March 23, 2017 Attorney Advertising Prior results do not guarantee a similar outcome 777 East Wisconsin Avenue, Milwaukee, WI 53202 414.271.2400
More informationAbout Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.
About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal
More informationYour defence toolkit. How to combat the cyber threat
Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The
More informationAllocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications
Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications Presented by: Selena J. Linde George Galt Aaron Coombs June 23, 2016 Perkins Coie LLP Presenter:
More informationMANAGING DATA BREACH
MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses
More informationCyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor
Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April 2013 Cyber Risks Advisor 1 Contents Information Age Directive On Network and Information Security
More informationWhen Trouble Knocks, Will Directors and Officers Policies Answer?
When Trouble Knocks, Will Directors and Officers Policies Answer? Michael John Miguel Morgan Lewis & Bockius LLP Los Angeles, California The limit of liability theory lies within the imagination of the
More informationACCOUNTANTS PROFESSIONAL LIABILITY POLICY LIMITED COVERAGE (CLAIMS-MADE)
CPA Mutual Insurance Company of America Risk Retention Group Burlington, Vermont ACCOUNTANTS PROFESSIONAL LIABILITY POLICY LIMITED COVERAGE (CLAIMS-MADE) This Policy provides professional liability protection
More informationCYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP
www.willis.com July 2015 CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP INSIDE THIS EDITION... CYBER CLAIMS LANDSCAPE A SAMPLING OF LARGE CYBER SETTLEMENTS LEGAL
More informationCasualty (Liability) Basics
3 Casualty (Liability) Basics LEARNING OBJECTIVES Upon the completion of this chapter, you will be able to: 1. Define basic casualty or liability insurance terms 2. Recognize the liability insurance principles
More informationEMPLOYEE BENEFITS LIABILITY COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT PROVIDES CLAIMS-MADE AND REPORTED COVERAGE. PLEASE READ THE ENTIRE ENDORSEMENT CAREFULLY.
More informationPersonal Information Protection Act Breach Reporting Guide
Personal Information Protection Act Breach Reporting Guide If an organization determines that a real risk of significant harm exists to an individual as a result of a breach of personal information, section
More informationEMPLOYMENT-RELATED PRACTICES LIABILITY ENDORSEMENT
POLICY NUMBER: BUSINESSOWNERS BP 05 89 01 06 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYMENT-RELATED PRACTICES LIABILITY ENDORSEMENT This endorsement modifies insurance provided
More informationTHIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY CRISIS MANAGEMENT COVERAGE The Insurer shall pay on behalf of the Insured: 1) Crisis Management Expenses that are a direct result of a Network
More informationInsuring your online world, even when you re offline. Masterpiece Cyber Protection
Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied
More informationVaco Cyber Security Panel
Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.
More informationSurprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their
When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises
More informationTHREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY
March 7, 2014 THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY In Zurich Amer. Ins. Co. v. Sony Corp., Index No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), the New York trial court held that Sony Corporation
More informationRIMS Cyber Presentation
RIMS Cyber Presentation Forrest Pace Cyber & Strategic Risk Leader South Zone AIG Property Casualty Forrest.Pace@aig.com 1 Bio Forrest Pace is the Cyber and Strategic Risk Leader for the South Zone, coordinating
More informationEMPLOYEE BENEFITS LIABILITY COVERAGE FORM
EMPLOYEE BENEFITS LIABILITY COVERAGE FORM THIS COVERAGE FORM PROVIDES CLAIMS-MADE COVERAGE. PLEASE READ THE ENTIRE FORM CAREFULLY. SECTION I EMPLOYEE BENEFITS LIABILITY COVERAGE 1. Insuring Agreement a.
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationSkyAngelGPS Annual Purchase and Services Agreement
SkyAngelGPS Annual Purchase and Services Agreement This Agreement is made this day of, 20, by and between Assistive Technology Services LLC. Dealer and Customer. Purchaser (Subscriber) Information: (Person
More informationCrossing the Breach. It won t happen to us
Crossing the Breach P R O T E C T I N G F R O M D ATA B R E A C H E S I S M O R E T H A N A N I. T. I S S U E WHITE PA P E R V E S T I G E D I G I TA L I N V E S T I G AT I O N S Crossing the Breach It
More informationCENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS
CENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS Effective June 1, 2014 The following terms and conditions apply to electronic and online delivery and presentation of your invoices by CenturyLink
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationCyber Risk Mitigation
Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information
More informationThe Cyber Insurance Broker Conundrum
CLM 2017 Annual Conference March 29-31, 2017 Nashville, TN The Cyber Insurance Broker Conundrum The Cyber Insurance Broker Conundrum I. Introduction P.F. Chang s is reeling after an U.S. District Court
More informationIDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY
IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY Slide 1 Identity Theft Coverage on Insurance Policies November 8, 2013 Slide 2 What s the big deal? Slide 3 PII Personally Identifiable Information
More informationCyber, Data Risk and Media Insurance Application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationSummary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)
GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters
More informationSTEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH
STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,
More information