Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered?

Size: px
Start display at page:

Download "Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered?"

Transcription

1 Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered? Speakers : Edward M. Joyce, Partner, Jones Day Leslie Lamb, Director Global Risk Management, Cisco Systems, Inc.

2 The views expres s ed by the s peakers are not thos e of the s peaker s employer, firm, clients, or any other organization. The opinions expres s ed do not cons titute legal or ris k management advice. The views dis cus s ed are for educational purpos es only, and provided only for us e during this s es s ion.

3 Learning Objectives At the end of this s es s ion, you will: Identify and decipher relevant ins urance policies regarding privacy, hacking and IP claims Be prepared to develop a good paper trail for pres enting thes e claims Identify and addres s common pitfalls in pres enting cyber ins urance claims

4

5 Recent Cyber Attacks Oct 2016 Dyn Cyberattack DDoS causing major internet platforms and services to be unavailable to many in Europe and North America May Primera Blue Cross 11 million customers Feb 2015 Anthem tens of millions of customers and employees Nov 2014 Sony Pictures attack wiped clean internal DCs and led to cancellation of The Interview Sept 2014 Home Depot 56 million payment cards July/Aug 2014 JP Morgan Chase 83 million households and small businesses June 2014 Community Health Systems 4.5 million patient records April 2014 Michaels Stores 3 million customer payment cards stolen December 2013 Target 40 million credit and debit cards stolen and 70 million people affected by stolen PII

6 A Public Relations Nightmare Data breaches/cyber attacks become public Neiman Marcus (Jan 2014) Barnes & Noble (Oct 2012) Global Payments (Mar 2012) Zappos (Jan 2012) Sony s Playstation Network (Apr 2012) Michael Stores (May 2011) State attorneys general publicize breaches online Privacy advocates track and publicize breaches Litigation

7 Target Industries Targets of Opportunity Retail Hospitality Health Care Education Ongoing Targets Financial Services Technology Government Potential Targets? Energy Transportation Critical Infrastructure

8 RECENT DATA BREACHES Yahoo!, Inc. [September 2016] Yahoo admitted an unknown group hacked 500 million accounts in 2014 one of the largest number of user accounts hacked from a single website in history Verizon Enterprise Solutions [March 2016] Hackers stole contact information for 1.5 million customers AdultFriendFinder.com [October 2016] In an attack similar to the AshleyMadison attack, hackers stole data associated with 412 million accounts Jones Day

9 ANATOMY OF A DATA BREACH A major breach incident creates an immediate and urgent crisis similar to a natural disaster Requires decisive and coordinated action on several fronts with multiple constituencies Significant legal challenges include: Breach Notification Requirements Regulatory Investigations Class Action Litigation Insurance Coverage Jones Day

10 BREACH NOTIFICATION 47 out of 50 states require consumers to be notified if unencrypted Personal Information exposed. Some states also require notification to Attorney General. Personal Information is defined somewhat differently by the 50 states Generally includes a person s name in combination with other information that identifies a particular individual or permits contacting of an individual Jones Day

11 BREACH NOTIFICATION Decision must be made early, sometime under difficult circumstances Time to assess notice obligations? Risk of leaks or bloggers Factual or forensic uncertainty Decision has important ramifications Breach becomes public Increases costs Generates litigation and government involvement Jones Day

12 REGULATORY ENFORCEMENT Data breach can result in investigations by government agencies Federal, state, and foreign jurisdictions Government can issue subpoenas, demand documents, impose fines and penalties Claims include: Failure to implement sound security protocols Violation of company privacy policy Many states have data security statutes that require reasonable security procedures or other requirements Jones Day

13 REGULATORY ENFORCEMENT Federal Agencies Federal Trade Commission (FTC) Securities Exchange Commission (SEC) Department of Health and Human Services Office for Civil Rights (OCR) State Attorneys General Multi-state AG investigations -- common in major breaches Coordination between state/federal may not be optimal Jones Day

14 CLASS ACTION LITIGATION Breaches that involve customer or employee data often result in class action lawsuits Lawsuits typically allege: Company s negligent data security practices caused breach Injury to privacy rights due to release of personal information Heightened risk of identity theft Expenses for ID protection Company delay in notifying consumers Jones Day

15 CLASS ACTION LITIGATION Common Law Claims Statutory Claims Invasion of Privacy State Consumer Protection Statutes Negligent data security State Data Breach Acts Breach of contract / warranty Fraud / misrepresentation State Medical Privacy statutes Fair Credit Reporting Act Jones Day

16 CLASS ACTION LITIGATION Key legal issues include: Standing who sues for damages re data breach? out-of-pocket loss? Legal standard -- strict liability, negligence, something else? What are reasonable cybersecurity measures? Causation Can harm be traced to your breach? Defenses based on user agreement Waiver / Arbitration Clause Jones Day

17 BREACH COSTS/DAMAGES Response Costs Legal Claims Legal fees for breach response Forensic investigation Breach Notice ID protection/credit monitoring Class action defense costs and settlement Defense of government proceedings Government fines/penalties Card brand claims & assessments Business Losses Restoration of data Lost revenue/business interruption Extra expenses Reputational harm / loss of market share Jones Day

18 BREACH COSTS/DAMAGES Data breach costs continue to rise 2016 costs up 2.6% from 2015 costs Published estimates of average data breach costs vary Ponemon: $236 per compromised record (in the U.S.) Verizon : $0.58 per compromised record True costs will depend on certain key factors Degree of preparedness Personally Identifiable Information ( PII ) and disclosure requirements Class action litigation Market impact Insurance Coverage Jones Day

19 INSURANCE COVERAGE Major shifts insurance industry over the last decade Insurers broadened coverage under traditional insurance policies to provide some cyber protection during early days of the internet Today, insurers have reversed course Denying coverage under traditional insurance policies Adding exclusions and coverage limitations Marketing new forms of cyber insurance sets up a straw man Jones Day

20 CYBER INSURANCE COVERAGE Cyber Insurance policies cover five major categories of costs: Incident Response Coverage - cost of legal and forensic investigations, data restoration Privacy Notification Coverage - notice to customers, identity theft protection, credit monitoring Third-Party Liability Coverage - defense and settlement of claims alleging breach of data security or disclosure of PII Regulatory Coverage - defense and settlement of government claims and investigations First-Party Coverage - lost revenue and extra expense Jones Day

21 CYBER INSURANCE COVERAGE Cyber insurance market is not yet mature and policies may be inadequate Standard forms have not yet been developed. Policies are complex and have not yet been tested by the courts Policies are expensive and may require a high self-insured retention (SIR) Numerous exclusions that limit coverage Notification and consent requirements (for counsel, consultants, and major costs) create pitfalls for the uninformed policyholder Jones Day

22 Traditional Coverage for a Data Breach?? Property Insurance Crime Insurance/Fidelity Bond CGL Insurance Policies D&O/Professional Liability Insurance Policies

23 Lawsuits that Follow Data Breach/Invasion of Privacy Invasion of privacy Negligence and other tort claims Breach of contract Enforcement actions by federal regulators Actions by State Attorneys General Can res ult in (1) s ubs tantial defens e cos ts ; and (2) pos s ible damages /s ettlements 23

24 Coverage for the Follow-on Lawsuits -- Data Breach/Invasion of Privacy Commercial General Liability (CGL) Errors and Omissions (E&O) Liability Directors and Officers (D&O) Liability Cyber Liability/Data Breach Policies

25 Traps to Avoid First Party Property Policies Notice of loss Proof of loss When and how? At the Company s request? Partial Proof/interim payment Suit limitation clause Tolling agreement/waiver

26 Traps to Avoid - Liability Policies Notice Give notice as soon as practicable v. immediately; but give notice of what? Notice of claim/notice of circumstances to lock in a specific policy period (typically claims made policies) Cooperation Clause/Claims Management What should you be sending the insurer? Insurance Company Consent/Approval For expenses, defense costs and settlements Is it in writing?

27 Insurance Policy Conditions Traps to Avoid Notice is not like wine, it does not get better with age!

28 What Triggers the First Party Property Policies for Data Breaches? First Party Property Policies Direct physical loss of or damage to property Exclusions: computer data -- in or out? Date of discovery -- Crime Insurance/Fidelity Bond 6th Circuit decision in DSW Inc. (Aug 2012) Note: does your policy specifically include coverage?

29 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? CGL Policies Bodily Injury and Property Damage Personal and Advertising Injury Oral or written publication, in any manner, of material that violates a person's right of privacy Covered Offense Invasion of Privacy During the Policy Period Publication

30 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? Claims-Made Policies D&O, E&O/Professional Liability Breadth of your D&O entity coverage Private company v. public company: what are the differences?

31 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? Claims-Made Policies (cont.) Breadth of "Claim" definition - What is included? FTC action/proceeding? What kind? Subpoena? Investigations? "Wrongful Act" definition -- error, omission and/or act; does it need to be negligent? "Loss" Definition -- does the definition list specific ins and outs?

32 What Triggers the Liability Policies for Data Breach/Invasion of Privacy Claims? Claims-Made Policies (cont.) Breadth of exclusions -- willful, malicious and/or criminal acts? Whose willful, malicious and/or criminal acts? Interrelated claims/interrelated wrongful acts -- Where does this claim go? Whose policy is triggered? Tension between interrelated claims/wrongful acts, Claim definition, exclusions and notice

33 INSURANCE TAKEAWAYS Insurers appear to be paying cyber claims for now Market is growing while insurers compete for market share Opportunities for policyholders to improve coverage through smart and focused approach during renewal process Understand your existing policy and its limitations Understand which terms matter most in the event of a breach Seek targeted changes that will enhance coverage Jones Day

34 INSURANCE TAKEAWAYS Cyber and data breach claim require proactive insurance strategy with early engagement. Initial action should include: 1. Review relevant policies and develop strategic plan which policies apply, what losses are covered, what steps must be taken 2. Integrate insurance strategy into overall response efforts 3. Identify and track breach-related costs 4. Maintain active, ongoing communication with insurers 5. Added: Maintain active communication with your internal CISO and/or IT Organization

35 Questions?

36

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

Aon Cyber Risk and Directors & Officers Forum CRM011

Aon Cyber Risk and Directors & Officers Forum CRM011 Aon Cyber Risk and Directors & Officers Forum CRM011 Speakers: Leslie Lamb, Director, Global Risk & Resiliency Management, Cisco Systems Timothy Fletcher, Senior Vice President and Team Leader, Aon Risk

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity 2017 Public Safety Employees Pension & Benefits Conference Ronald A. King (517) 318-3015 rking@ I am convinced that there are only

More information

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE

More information

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber Protection Data Creates Duties What data do you access, and

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM v Anderson Kill P.C. All Rights Reserved.

THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM v Anderson Kill P.C. All Rights Reserved. THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM 1 Allen Wolff Shareholder, Anderson Kill Insurance Lawyer Construction Lawyer Trial Lawyer 2 Disclaimer The views expressed by the

More information

Trends, Vendor Management, and Practical Tips For In House Counsel. ACC National Capital Region October 16, 2018

Trends, Vendor Management, and Practical Tips For In House Counsel. ACC National Capital Region October 16, 2018 Cyberinsurance Issues Coming for 2019 Trends, Vendor Management, and Practical Tips For In House Counsel ACC National Capital Region October 16, 2018 Scott N. Godes Partner Insurance Recovery Co-Chair,

More information

MedGuard. The ProAd. The Coverage You Need. Coverage for the Legal Expenses of Defending Against Administrative Proceedings

MedGuard. The ProAd. The Coverage You Need. Coverage for the Legal Expenses of Defending Against Administrative Proceedings is a defense provided by is a defense provided by Defense Coverage for medguard The Extra Protection You Need A basic professional liability policy pays the costs of defending and indemnifying you against

More information

Cyber/Privacy Coverage

Cyber/Privacy Coverage Cyber/Privacy Coverage COVERAGE REVIEW COVERAGE ISSUE COVERAGE GRANTS Third Party Coverage Options Network Security Liability Privacy Liability Professional Liability Technology E&O Website Media Liability

More information

Cyber breaches: are you prepared?

Cyber breaches: are you prepared? Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do

More information

Directors & Officers Insurance 101

Directors & Officers Insurance 101 Directors & Officers Insurance 101 The outlines of coverage used throughout this presentation are not intended to express any legal opinion as to the nature of coverage. They are only intended to provide

More information

Five Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims

Five Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims Five Questions to Ask to Maximize D&O Insurance Coverage of FCPA Claims By Andrew M. Reidy, Joseph M. Saka and Ario Fazli Lowenstein Sandler Companies spend hundreds of millions of dollars annually to

More information

DATA COMPROMISE COVERAGE FORM

DATA COMPROMISE COVERAGE FORM DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout

More information

Anatomy of a Data Breach

Anatomy of a Data Breach Anatomy of a Data Breach May 17, 2017 Lucie F. Huger Officer, Greensfelder, Hemker & Gale, P.C. Mary Ann Wymore Officer, Greensfelder, Hemker & Gale, P.C. Information is the New Oil! Companies are collecting

More information

Cyber Risk Insurance. Frequently Asked Questions

Cyber Risk Insurance. Frequently Asked Questions Cyber Risk Insurance Frequently Asked Questions Frequently Asked Questions What is Cyber Risk? Why should I buy Cyber Risk Insurance? What is the cost? Who is Great American Insurance? Why should I buy

More information

Cyber Risks & Cyber Insurance

Cyber Risks & Cyber Insurance Cyber Risks & Cyber Insurance Terry Quested Executive Director Associated Risk Managers of Ohio Darren Faye Vice President Leonard Insurance / Assured Partners Legal Disclaimer The views, information and

More information

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

PRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C.

PRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C. PRESENTERS Todd Seiders Director of Loss Control for Petra Risk Solutions oversees the risk management and claims departments for approximately 3400 hotels, resorts and spas nationwide extensive hands

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance Digitalization in Insurance a Threat or an Opportunity Beirut, 3 & 4 May 2017 Alexander Blom - AIG 1 Today s Cyber Presentation Cyber risks insights from an insurance perspective

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

MANAGED CARE ERRORS AND OMISSIONS COVERAGE ENDORSEMENT FIDUCIARY COVERAGE SECTION E1855MBG-0309

MANAGED CARE ERRORS AND OMISSIONS COVERAGE ENDORSEMENT FIDUCIARY COVERAGE SECTION E1855MBG-0309 MANAGED CARE ERRORS AND OMISSIONS COVERAGE ENDORSEMENT FIDUCIARY COVERAGE SECTION E1855MBG-0309 In consideration of the premium charged, it is hereby understood and agreed that FIDUCIARY COVERAGE SECTION

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,

More information

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions Our Speakers Mark Melodia is Partner and Co-Head of the Global Data Security, Privacy & Management

More information

When The Wind Blows: Renewable Energy Risk Management Strategies

When The Wind Blows: Renewable Energy Risk Management Strategies When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance

More information

CyberRisk: What we know and what we don't know

CyberRisk: What we know and what we don't know CyberRisk: What we know and what we don't know JOHN MULLEN, ESQ., LEWIS BRISBOIS BISGAARD & SMITH LLP ADAM COTTINI, ARTHUR J GALLAGHER MARCH 16, 2016 2014 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

More information

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP HOW TO NAVIGATE THE LANDSCAPE OF GLOBAL PRIVACY AND DATA PROTECTION Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP Topics to Cover General Concepts Increased U.S. enforcement activity

More information

Chubb Cyber Enterprise Risk Management

Chubb Cyber Enterprise Risk Management Chubb Cyber Enterprise Risk Management Fact Sheet Financial Lines Chubb Cyber Enterprise Risk Management When it comes to a data security breach or privacy loss, it isn t a matter of if it will happen

More information

503 SURVIVING A HIPAA BREACH INVESTIGATION

503 SURVIVING A HIPAA BREACH INVESTIGATION 503 SURVIVING A HIPAA BREACH INVESTIGATION Presented by Nicole Hughes Waid, Esq. Mark J. Swearingen, Esq. Celeste H. Davis, Esq. Regional Manager 1 Surviving a HIPAA Breach Investigation: Enforcement Presented

More information

Cyber Security & Insurance Solution Karachi, Pakistan

Cyber Security & Insurance Solution Karachi, Pakistan March 2017 Cyber Security & Insurance Solution Karachi, Pakistan Ram Garg CFA, MBA Financial & Casualty Line J B Boda & Co (Singapore) Pte Ltd Karachi Insurance Institute Agenda Cyber Risk - Background

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

Critical Issues in Cybersecurity:

Critical Issues in Cybersecurity: Critical Issues in Cybersecurity: Are you prepared and in compliance? July 27, 2017 Robert Barbarowicz Scott Lyon JillAllison Opell 1 What Types of Information do We Collect? PII v. PHI v. NPI v. sensitive/confidential

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker Safeguarding Your HIPAA and Personal Health Information Data Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker 1 Overview» Patient information confidentiality Grant requirements

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Insurance Buyers News

Insurance Buyers News Insurance Buyers News Springfield PO Box 4207, Springfield, MO 65808 Phone: 800-422-5275 417-887-3550 Fax: 417-887-3252 Rolla PO Box 1258, Rolla, MO 65402-1258 Phone: 800-364-2212 573-364-8888 Fax: 573-341-2257

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017

Solving Cyber Risk. Security Metrics and Insurance. Jason Christopher March 2017 Solving Cyber Risk Security Metrics and Insurance Jason Christopher March 2017 How We Try to Address Cyber Risk What is Cyber Risk? Definitions Who should be concerned? Key categories of cyber risk Cyber

More information

Cyber Liability Insurance for Sports Organizations

Cyber Liability Insurance for Sports Organizations Cyber Liability Insurance for Sports Organizations The biggest threat to your organization or club isn t a loss of funds. It s a loss of data. From online sign-ups and payment systems to social media

More information

Summary Comparison of Current Senate Data Security and Breach Notification Bills

Summary Comparison of Current Senate Data Security and Breach Notification Bills Data Security reasonable Standards measures Specific Data Security Requirements Personal Information Definition None (a) First name or (b) first initial and last name, in combination with one of the following

More information

SkyAngelGPS Monthly Purchase and Services Agreement

SkyAngelGPS Monthly Purchase and Services Agreement SkyAngelGPS Monthly Purchase and Services Agreement This Agreement is made this day of, 20 by and between Assistive Technology Services LLC. Dealer and (CUSTOMER) Purchaser (Subscriber) Information: (Person

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

What Solo and Small Firms Need to Know about Malpractice Insurance

What Solo and Small Firms Need to Know about Malpractice Insurance What Solo and Small Firms Need to Know about Malpractice Insurance Insurance Considerations 2 Greg Cooke Sales Manager USI Affinity Practice 360 - A Day for Lawyers & Law Firms May 6, 2016 2 Agenda 3 Where

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

HEALTHCARE INDUSTRY SESSION CYBER IND 011

HEALTHCARE INDUSTRY SESSION CYBER IND 011 HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

IS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE

IS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE IS YOUR CYBER LIABILITY INSURANCE ANY GOOD? A GUIDE FOR BANKS TO EVALUATE THEIR CYBER LIABILITY INSURANCE COVERAGE THOMAS H. BENTZ, JR.* I. INTRODUCTION The last several years have taught many banks that

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Venture Capital Private Equity

Venture Capital Private Equity Quick Reference Guide Zurich Asset Investment Managers Insurance Venture Capital Private Equity Zurich Insurance Solution (Venture Capital - Private Equity) has been updated and given a new name Zurich

More information

Private Investment Fund Liability Insurance Management and Professional Liability Coverage Part

Private Investment Fund Liability Insurance Management and Professional Liability Coverage Part I. Insuring agreements We will pay loss in excess of any applicable retention resulting from claims against you for a wrongful act as follows, provided the claim is first made against you and reported

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

HEALTHCARE BREACH TRIAGE

HEALTHCARE BREACH TRIAGE IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards

More information

Liability Insurance: Top Ten Facts Every In-House Counsel Should Know

Liability Insurance: Top Ten Facts Every In-House Counsel Should Know Liability Insurance: Top Ten Facts Every In-House Counsel Should Know Presentation for Association of Corporate Counsel Presented by Osborne & Nesbitt LLP Top Ten Facts 1. Claims Typically Covered 2. Occurrence

More information

Cyber Incident Response When You Didn t Have a Plan

Cyber Incident Response When You Didn t Have a Plan Cyber Incident Response When You Didn t Have a Plan April F. Doss Saul Ewing LLP How serious is the cybersecurity threat? Some sobering numbers from 2015: Over half a billion personal records were stolen

More information

Cyber Exposures: The Importance of Risk Identification and Transfer. Presented By: Joe Weipert

Cyber Exposures: The Importance of Risk Identification and Transfer. Presented By: Joe Weipert Cyber Exposures: The Importance of Risk Identification and Transfer Presented By: Joe Weipert The Complexity of Cyber Risk and its Severity My Goal Today: Getting Your Attention in 30 Minutes Average Claim

More information

Self-Defense Liability Coverage Form

Self-Defense Liability Coverage Form USCCA SELF-DEFENSE SHIELD MEMBERSHIP BENEFIT Self-Defense Liability Coverage Form SILVER GOLD PLATINUM ELITE $300,000 $600,000 $1,150,000 $2,250,000 in Self-Defense SHIELD Protection in Self-Defense SHIELD

More information

EMPLOYEE BENEFITS LIABILITY COVERAGE

EMPLOYEE BENEFITS LIABILITY COVERAGE POLICY NUMBER: COMMERCIAL GENERAL LIABILITY CG 04 35 12 07 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT PROVIDES CLAIMS-MADE COVERAGE.

More information

What is a privacy breach / security breach?

What is a privacy breach / security breach? What is a breach? What is a privacy breach / security breach? Privacy breach Computer security breach: The theft, loss or unauthorized disclosure of personally identifiable non-public information (PII)

More information

Cyber Insurance 2017:

Cyber Insurance 2017: Cyber Insurance 2017: Ensuring Your Coverage is Sound Thursday, March 23, 2017 Attorney Advertising Prior results do not guarantee a similar outcome 777 East Wisconsin Avenue, Milwaukee, WI 53202 414.271.2400

More information

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal

More information

Your defence toolkit. How to combat the cyber threat

Your defence toolkit. How to combat the cyber threat Your defence toolkit How to combat the cyber threat Contents The threat of cyber crime 4 How UK businesses are targeted 6 Case studies 8 Why cyber security is so important to manufacturers now 10 The

More information

Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications

Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications Presented by: Selena J. Linde George Galt Aaron Coombs June 23, 2016 Perkins Coie LLP Presenter:

More information

MANAGING DATA BREACH

MANAGING DATA BREACH MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses

More information

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April 2013 Cyber Risks Advisor 1 Contents Information Age Directive On Network and Information Security

More information

When Trouble Knocks, Will Directors and Officers Policies Answer?

When Trouble Knocks, Will Directors and Officers Policies Answer? When Trouble Knocks, Will Directors and Officers Policies Answer? Michael John Miguel Morgan Lewis & Bockius LLP Los Angeles, California The limit of liability theory lies within the imagination of the

More information

ACCOUNTANTS PROFESSIONAL LIABILITY POLICY LIMITED COVERAGE (CLAIMS-MADE)

ACCOUNTANTS PROFESSIONAL LIABILITY POLICY LIMITED COVERAGE (CLAIMS-MADE) CPA Mutual Insurance Company of America Risk Retention Group Burlington, Vermont ACCOUNTANTS PROFESSIONAL LIABILITY POLICY LIMITED COVERAGE (CLAIMS-MADE) This Policy provides professional liability protection

More information

CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP

CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP www.willis.com July 2015 CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP INSIDE THIS EDITION... CYBER CLAIMS LANDSCAPE A SAMPLING OF LARGE CYBER SETTLEMENTS LEGAL

More information

Casualty (Liability) Basics

Casualty (Liability) Basics 3 Casualty (Liability) Basics LEARNING OBJECTIVES Upon the completion of this chapter, you will be able to: 1. Define basic casualty or liability insurance terms 2. Recognize the liability insurance principles

More information

EMPLOYEE BENEFITS LIABILITY COVERAGE

EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT PROVIDES CLAIMS-MADE AND REPORTED COVERAGE. PLEASE READ THE ENTIRE ENDORSEMENT CAREFULLY.

More information

Personal Information Protection Act Breach Reporting Guide

Personal Information Protection Act Breach Reporting Guide Personal Information Protection Act Breach Reporting Guide If an organization determines that a real risk of significant harm exists to an individual as a result of a breach of personal information, section

More information

EMPLOYMENT-RELATED PRACTICES LIABILITY ENDORSEMENT

EMPLOYMENT-RELATED PRACTICES LIABILITY ENDORSEMENT POLICY NUMBER: BUSINESSOWNERS BP 05 89 01 06 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYMENT-RELATED PRACTICES LIABILITY ENDORSEMENT This endorsement modifies insurance provided

More information

THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY CRISIS MANAGEMENT COVERAGE The Insurer shall pay on behalf of the Insured: 1) Crisis Management Expenses that are a direct result of a Network

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Vaco Cyber Security Panel

Vaco Cyber Security Panel Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.

More information

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their When It Comes to Data Breaches, Why Are Corporations Largely Uninsured? Under Attack and Unprepared: Argo Group Cyber Insurance Survey 2017 Surprisingly, only 40 percent of small and medium-sized enterprises

More information

THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY

THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY March 7, 2014 THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY In Zurich Amer. Ins. Co. v. Sony Corp., Index No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), the New York trial court held that Sony Corporation

More information

RIMS Cyber Presentation

RIMS Cyber Presentation RIMS Cyber Presentation Forrest Pace Cyber & Strategic Risk Leader South Zone AIG Property Casualty Forrest.Pace@aig.com 1 Bio Forrest Pace is the Cyber and Strategic Risk Leader for the South Zone, coordinating

More information

EMPLOYEE BENEFITS LIABILITY COVERAGE FORM

EMPLOYEE BENEFITS LIABILITY COVERAGE FORM EMPLOYEE BENEFITS LIABILITY COVERAGE FORM THIS COVERAGE FORM PROVIDES CLAIMS-MADE COVERAGE. PLEASE READ THE ENTIRE FORM CAREFULLY. SECTION I EMPLOYEE BENEFITS LIABILITY COVERAGE 1. Insuring Agreement a.

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

SkyAngelGPS Annual Purchase and Services Agreement

SkyAngelGPS Annual Purchase and Services Agreement SkyAngelGPS Annual Purchase and Services Agreement This Agreement is made this day of, 20, by and between Assistive Technology Services LLC. Dealer and Customer. Purchaser (Subscriber) Information: (Person

More information

Crossing the Breach. It won t happen to us

Crossing the Breach. It won t happen to us Crossing the Breach P R O T E C T I N G F R O M D ATA B R E A C H E S I S M O R E T H A N A N I. T. I S S U E WHITE PA P E R V E S T I G E D I G I TA L I N V E S T I G AT I O N S Crossing the Breach It

More information

CENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS

CENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS CENTURYLINK ELECTRONIC AND ONLINE PAYMENT TERMS AND CONDITIONS Effective June 1, 2014 The following terms and conditions apply to electronic and online delivery and presentation of your invoices by CenturyLink

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber Risk Mitigation

Cyber Risk Mitigation Cyber Risk Mitigation Eide Bailly Howalt + McDowell Insurance Introduction Meet your presenters Eric Pulse Risk Advisory Director 20 years in the public accounting and consulting industry providing information

More information

The Cyber Insurance Broker Conundrum

The Cyber Insurance Broker Conundrum CLM 2017 Annual Conference March 29-31, 2017 Nashville, TN The Cyber Insurance Broker Conundrum The Cyber Insurance Broker Conundrum I. Introduction P.F. Chang s is reeling after an U.S. District Court

More information

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY Slide 1 Identity Theft Coverage on Insurance Policies November 8, 2013 Slide 2 What s the big deal? Slide 3 PII Personally Identifiable Information

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716)

Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) GENERAL CHANGES 1. Notice Provisions Summary of Form Changes e-md /MEDEFENSE Plus Insurance Policy (from version P1818CE-0115 to P1818CE-0716) a. Currently, the policy requires notice to the Underwriters

More information

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and data risks to your business,

More information