CYBERINSURANCE TRENDS AND DEVELOPMENTS

Size: px
Start display at page:

Download "CYBERINSURANCE TRENDS AND DEVELOPMENTS"

Transcription

1

2 CYBERINSURANCE TRENDS AND DEVELOPMENTS What cyber risks can be covered Emerging products Recent cases, pending legislation and regulation Claims case studies

3 INTRODUCTION TO CYBERINSURANCE Gartner defines cyber insurance as coverage protecting against losses related to cyberrisks, such as data theft/loss, business interruption caused by a computer malfunction or virus and fines or lost income because of system downtime, network intrusion and/or information security breaches.

4 THE CYBERINSURANCE MARKET Betterley Estimates 2016 Premiums at $3.2 Billion* PWC Estimates The Market To Be $7.5 Billion By 2020** * The Betterley Report: June ** Insurance 2020 & Beyond: Reaping the Dividends of Cyber Resilience

5 CYBERINSURANCE IS NOT General Liability Business Owner Policy Professional Liability Directors and Officers Crime * (Although there are cybercrime policies)

6 General Liability Data not covered WHY? Specific exclusions since ISO made mandatory Litigation- breach cases

7 WHY? Professional Liability/Errors & Omissions No litigation as yet, but see Affinity Gaming v Trustwave PL covers negligence. Cyber losses not necessarily due to negligence Exclusions

8 WHY? Directors and Officers No litigation, but derivative actions for failure to secure Errors and omissions Exclusions Crime Maybe, but read the policy

9 WHY? Business Owner Policy ISO mandatory exclusion 2015 ISO introduced information security endorsement

10 Data Breach TYPES OF COVERAGES Computer Attack & Network Security liability Media Liability Identity Theft

11 NEW AND DEVELOPING COVERAGES Personal Lines Connected Home Data Breach Cyber Attack Cyber Bullying Digital Assets

12 Commercial IoT NEW AND DEVELOPING Automated Cars & Trucks Alternative Distribution Channels (Commercial Product Delivered by Bank) Electronic Funds Transfer (Fraud by Hacker/Social Engineer)

13 WHAT S COVERED? 1 st Party -- your own, direct losses 3 rd Party liability to third parties

14 1 ST PARTY COSTS Forensic IT Services Crisis Management Legal Advice Public Relations Call Center Cost of Notifying Affected Individuals

15 1 ST PARTY COSTS PCI Fines and Penalties Business Interruption Data Reconstruction Damage to Hardware/Software/Apps Credit Monitoring Services for Affected Individuals

16 3 RD PARTY COSTS Defense of Litigation Regulatory Defense Costs and Fines Damage Awards/Settlement to Affected Individuals

17 Q&A What are you seeing that isn t covered? How can the insurance industry help you to finance risks you re not seeing covered today?

18 LEGISLATIVE TRENDS

19 47 State Laws DATA BREACH Scattered federal laws

20 DATA BREACH Tennessee- elimination of encryption safe harbor- will it matter? Illinois- joining other states in including health information as pii Vermont- health information pii + established private c/a for breach of phi

21 Nebraska- DATA BREACH Joining other states in requiring Attorney General notification Online account credentials require notice- 5 th state to do so No encryption safe harbor if key also compromised

22 PENDING Federal data breach bills Won t pass prior to election Preemption of state laws a big issue Whether security standards will be mandated (NIST, SANS)

23 BREACH LEGISLATION TAKE-AWAY Uncertainty in breach statutes impacts insurers Increasing regulation at state level Inconsistent over the different jurisdictions Increases cost of claims

24 AUTONOMOUS VEHICLES Congress and several states passed bills to set up study committees and/or allow for autonomous vehicle operation

25 AUTONOMOUS VEHICLES TAKE-AWAYS May not affect the claimant, but fingerpointing in autonomous vehicle accidents may increase litigation and associated costs Is it the driver s fault or the OEM? Decline in accidents may lower cost of insurance

26 LITIGATION

27 DATA BREACH LITIGATION About 5% of data breaches result in 3 rd party litigation 76% decline from 2014 to 2015 in credit card related breach suits 26% overall decline Source: Bryan Cave, 2016 Data Breach Litigation Report

28 DATA BREACH LITIGATION No reported class action verdicts Likelihood of a defense verdict = 98% SOURCE: Empirical Analysis of Data Breach Litigation (11 Journal of Empirical Legal Studies 74 (2014), Sasha Romanosky, David A. Hoffman, and Alessandro Acquisti, )

29 DATA BREACH LITIGATION SOURCE: Empirical Analysis of Data Breach Litigation (11 Journal of Empirical Legal Studies 74 (2014), Sasha Romanosky, David A. Hoffman, and Alessandro Acquisti, )

30 CLAIMS EXPERIENCE Fewer than 1% of breach claims involved 3rd party claims When there were 3rd party claims, 2/3 were made by individuals, 1/3 were class actions

31 HURDLES TO PLAINTIFFS IN BREACH SUITS Hurdles for Data Breach Plaintiffs Standing- Must show concrete injury (although injury may be intangible) Failure to state a claim upon which relief can be granted- injury alleged insufficient- must be compensable Establishing causation Economic loss doctrine- negligence Class certification- Proposed class must have common injuries that can be calculated

32 SPOKEO V ROBINS Article III Standing Nothing new, just restated and remanded Actual/imminent harm Injury in fact Traceable to the challenged conduct Likely to be redressed by court

33 SPOKEO TAKE-AWAYS Potential application to data compromise Mixed bag of application Didn t clarify anything except that the full analysis must be completed

34 P.F. CHANG'S CHINA BISTRO, INC. V. FED. INS. CO. Payment card processor passed $2 M in chargebacks, assessments and fees to PF Chang s following breach (MasterCard charged BAMS) Dismissed at summary judgment

35 P.F. CHANG S POLICY EXCLUSIONS Data compromise policy Covers Privacy Injury - injury is not Privacy Injury Excludes any loss or expense assumed by any insured under any contract or agreement.

36 P.F. CHANG S TAKE-AWAY So, this is why we talked about types of coverage. If you re looking for PCI assessments & fees to be covered, make sure it s in the policy

37 TRAVELERS V PORTAL The Travelers Ind. Co. of Am. V Portal Healthcare Solutions, L.L.C., 4 th Cir Publication arguably alleged because information could be found via Google Court held duty to defend (although not necessarily duty to pay)

38 TRAVELERS Publication where some other cases had not found it before (Recall Total Info. Mgmt., Inc., et al. v Federal Insurance Co., et al.,; Zurich Am. Ins Co. v Sony Corp. of Am.) General liability, not data compromise policy

39 TRAVELERS TAKE-AWAYS The ISO issued exclusions to CGL policies beginning in 2013 (after this breach). The typical CGL policy does not cover breach/publication Whether or not the court finds publication is intensely fact specific and not necessarily predictable

40 AND The Travelers decision was unpublished, so it doesn t have precedential value

41 QUESTIONS? Thank you! 2016 The Hartford Steam Boiler Inspection and Insurance Company. All rights reserved. This presentation is for informational purposes only. HSB makes no warranties or representations as to the accuracy or completeness of the content of this presentation. Under no circumstances shall HSB or any party involved in creating or delivering this presentation be liable to you for any loss or damage that results from the use of the information or images contained in this presentation.

42 HOW DID THINGS GO? (WE REALLY WANT TO KNOW!) Did you enjoy this session? Is there anyway we could make it better? Let us know by filling out a speaker evaluation. Start by opening the IAPP Events App. Select this session and tap Click the following link for speaker evaluations. Once you ve answered all three questions, tap Done and you re all set. Thank you!

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP

Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP HOW TO NAVIGATE THE LANDSCAPE OF GLOBAL PRIVACY AND DATA PROTECTION Paul Jones, Jones & Co. Kathleen Rice, Faegre Baker Daniels, LLP Topics to Cover General Concepts Increased U.S. enforcement activity

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby Cyberinsurance: Necessary, Expensive and Confusing as Hell Presenters: Sharon Nelson and Judy Selby Setting the stage 2018 report from PwC one-third of US businesses have some form of cyberinsurance PwC

More information

CyberRisk: What we know and what we don't know

CyberRisk: What we know and what we don't know CyberRisk: What we know and what we don't know JOHN MULLEN, ESQ., LEWIS BRISBOIS BISGAARD & SMITH LLP ADAM COTTINI, ARTHUR J GALLAGHER MARCH 16, 2016 2014 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

Emerging legal and regulatory risks

Emerging legal and regulatory risks Emerging legal and regulatory risks Presentation for AusCERT2016 Matthew Pokarier and Ben Di Marco Structure Regulatory risks Third-party liability Actions by affected individuals Actions by banks and

More information

Empirical Analysis of Data Breach Litigation. Sasha Romanosky David Hoffman Alessandro Acquisti

Empirical Analysis of Data Breach Litigation. Sasha Romanosky David Hoffman Alessandro Acquisti Empirical Analysis of Data Breach Litigation Sasha Romanosky David Hoffman Alessandro Acquisti 1 Problem: externalities caused by loss or theft of consumer information Modern IS, Web 2.0, and social media

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2019

TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2019 February 2019 TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2019 Decent Growth, but Concerns about Cyber Linger Richard S. Betterley, LIA President Betterley Risk Consultants, Inc. Highlights of this Issue

More information

Trends, Vendor Management, and Practical Tips For In House Counsel. ACC National Capital Region October 16, 2018

Trends, Vendor Management, and Practical Tips For In House Counsel. ACC National Capital Region October 16, 2018 Cyberinsurance Issues Coming for 2019 Trends, Vendor Management, and Practical Tips For In House Counsel ACC National Capital Region October 16, 2018 Scott N. Godes Partner Insurance Recovery Co-Chair,

More information

Cyber Insurance 2017:

Cyber Insurance 2017: Cyber Insurance 2017: Ensuring Your Coverage is Sound Thursday, March 23, 2017 Attorney Advertising Prior results do not guarantee a similar outcome 777 East Wisconsin Avenue, Milwaukee, WI 53202 414.271.2400

More information

Cyber Insurance I don t think it means what you think it means

Cyber Insurance I don t think it means what you think it means SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of

More information

Data Breach Program Pricing Companies with revenues less than $1,000,000

Data Breach Program Pricing Companies with revenues less than $1,000,000 Data Breach Program Pricing Companies with revenues less than Limit of Liability Aggregate $250,000 $500,000 $2,000,000 Retention $1,000 $1,000 $1,000 $1,000 25,000 records $250,000 $500,000 Security &

More information

Trends in Cyber-Insurance Coverage to Meet Insureds Needs

Trends in Cyber-Insurance Coverage to Meet Insureds Needs Trends in Cyber-Insurance Coverage to Meet Insureds Needs Linda Wendell Hsu Selman Breitman LLP 33 New Montgomery Street, Sixth Floor San Francisco, CA 94105 (415) 979-0400 lhsu@selmanlaw.com William A.

More information

Conditions Of Use Disclaimer

Conditions Of Use Disclaimer Conditions Of Use Conditions Of Use Disclaimer By using this material, you acknowledge your assent to the following conditions of use without limitation or qualification. Please read these conditions carefully

More information

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises By David Zetoony Partner, Bryan Cave LLP Courtney Stout Counsel, Davis Wright Tremaine LLP With Contributions By Suzanne Gladle,

More information

Data Breach Financial Protection Program Terms and Conditions

Data Breach Financial Protection Program Terms and Conditions Data Breach Financial Protection Program Terms and Conditions The Data Breach Financial Protection Program (the Program ) is a comprehensive expense reimbursement program, provided with some Netsurion

More information

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber Protection Data Creates Duties What data do you access, and

More information

Cyber breaches: are you prepared?

Cyber breaches: are you prepared? Cyber breaches: are you prepared? Presented by Michael Gapes, Partner Overview What is cyber crime? What are the risks and impacts to your business if you are a target? What are your responsibilities do

More information

Take It or Leave It: Pitfalls and Challenges of IT Contracts Thursday, May 4, 2017 General Session; 9:00 10:30 a.m.

Take It or Leave It: Pitfalls and Challenges of IT Contracts Thursday, May 4, 2017 General Session; 9:00 10:30 a.m. Take It or Leave It: Pitfalls and Challenges of IT Contracts Thursday, May 4, 2017 General Session; 9:00 10:30 a.m. Margarita Gutierrez, Deputy City Attorney, City and County of San Francisco Rosa M. Sanchez,

More information

Critical Issues in Cybersecurity:

Critical Issues in Cybersecurity: Critical Issues in Cybersecurity: Are you prepared and in compliance? July 27, 2017 Robert Barbarowicz Scott Lyon JillAllison Opell 1 What Types of Information do We Collect? PII v. PHI v. NPI v. sensitive/confidential

More information

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner

CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER INSURANCE IN IF - with a touch of Casualty - August 18 th 2017 Kristine Birk Wagner CYBER EXPOSURE IN IF TOPICS Brief overview of If s Liability portfolio Cyber today s definition Cyber coverages

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

CYBER LIABILITY REINSURANCE SOLUTIONS

CYBER LIABILITY REINSURANCE SOLUTIONS CYBER LIABILITY REINSURANCE SOLUTIONS CYBER STRONG. CYBER STRONG. State-of-the-Art Protection for Growing Cyber Risks Businesses of all sizes and in every industry are experiencing an increase in cyber

More information

DEATH, TAXES AND DATA BREACH: THE LEGAL LESSONS

DEATH, TAXES AND DATA BREACH: THE LEGAL LESSONS DEATH, TAXES AND DATA BREACH: THE LEGAL LESSONS NAPAVALLEYVINTNERS AUGUST 27, 2015 CHRIS PASSARELLI SENIOR COUNSEL, I.P. DICKENSON, PEATMAN & FOGARTY T: 707.261.7070 CP@DPF LAW.COM AGENDA Overview Legal

More information

When The Wind Blows: Renewable Energy Risk Management Strategies

When The Wind Blows: Renewable Energy Risk Management Strategies When The Wind Blows: Renewable Energy Risk Management Strategies Small Wind Conference 2017 1 Overview About HUB Insurance Solutions General Coverage Overview Stakeholders Cyber Liability Engineers and

More information

Hartford Steam Boiler (HSB) data security products for Commercial Lines.

Hartford Steam Boiler (HSB) data security products for Commercial Lines. Hartford Steam Boiler (HSB) data security products for Commercial Lines. Nationwide, together with HSB, offers data security insurance products that address several key data security exposures: Identity

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Cyber, Data Risk and Media Insurance Application form

Cyber, Data Risk and Media Insurance Application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY

THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY March 7, 2014 THREE ADDITIONAL AND IMPORTANT TAKEAWAYS FROM SONY In Zurich Amer. Ins. Co. v. Sony Corp., Index No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), the New York trial court held that Sony Corporation

More information

THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM v Anderson Kill P.C. All Rights Reserved.

THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM v Anderson Kill P.C. All Rights Reserved. THE MOST FREQUENT CLAIMS BROUGHT AGAINST HOTELS AND HOW TO PREVENT THEM 1 Allen Wolff Shareholder, Anderson Kill Insurance Lawyer Construction Lawyer Trial Lawyer 2 Disclaimer The views expressed by the

More information

One Tower Square Hartford, Connecticut (A Stock Insurance Company, herein called the Company)

One Tower Square Hartford, Connecticut (A Stock Insurance Company, herein called the Company) Declarations POLICY NO. One Tower Square Hartford, Connecticut 06183 (A Stock Insurance Company, herein called the Company) THE LIABILITY COVERAGES AND THE THIRD PARTY LIABILITY INSURING AGREEMENTS ARE

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

CLM 2016 New York Conference December 1, 2016 New York, New York

CLM 2016 New York Conference December 1, 2016 New York, New York CLM 2016 New York Conference December 1, 2016 New York, New York Adjuster training - Teaching Good Faith to prevent Bad Faith, Including Practice Advice to Avoid Extra-Contractual Claims in the Claim Handling

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management Privacy & Data Protection Agenda 2 Introductions Risk Management 101 Defining & Quantifying a Breach Prevention, Mitigation & Transfer Strategies Finance Strategy- Cyber Insurance

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist

Cyber a risk on the rise. Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber a risk on the rise Digitalization Conference Beirut, 4 May 2017 Fabian Willi, Cyber Risk Reinsurance Specialist Cyber data breaches reaching a new level 1 000 000 000 Source: http://money.cnn.com/2016/09/22/technology/yahoo-data-breach/

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

Protecting Against the High Cost of Cyberfraud

Protecting Against the High Cost of Cyberfraud Protecting Against the High Cost of Cyberfraud THE ROLE OF CYBER LIABILITY INSURANCE IN YOUR RISK MANAGEMENT STRATEGY Paying the Price...2 The Ransomware Scourge...3 Policy Provisions...3 Management Liability...4

More information

Cyber Liability Launch Event Moscow

Cyber Liability Launch Event Moscow Allianz Global Corporate & Specialty Cyber Liability Launch Event Moscow AGCS November 2016 Cyber Insurance market Stand Alone Business USA USA Started in the early to mid 1990 s 50 Started + carriers

More information

The Cyber Insurance Broker Conundrum

The Cyber Insurance Broker Conundrum CLM 2017 Annual Conference March 29-31, 2017 Nashville, TN The Cyber Insurance Broker Conundrum The Cyber Insurance Broker Conundrum I. Introduction P.F. Chang s is reeling after an U.S. District Court

More information

Insurance Coverage Law Update: The Recent Cases You Need to Know

Insurance Coverage Law Update: The Recent Cases You Need to Know Insurance Coverage Law Update: The Recent Cases You Need to Know October 13, 2016 Katherine J. Henry Kate Margolis J. Alex Purvis Bradley Arant Boult Cummings LLP Attorney-Client Privilege. Topics We Will

More information

Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal?

Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal? Data Breaches and Identity Theft: When is Mandatory Disclosure Optimal? WEIS 06.07.2010 Sasha Romanosky (Heinz) Richard Sharp (Math. Sci.) Alessandro Acquisti (Heinz) 1 Overview Data breaches occur when

More information

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional Services: $100,000 $250,000 $500,000 $1,000,000 $2,000,000 Other:$ Technology Product

More information

HEALTHCARE BREACH TRIAGE

HEALTHCARE BREACH TRIAGE IAPP Privacy Academy September 30 October 2, 2013 HEALTHCARE BREACH TRIAGE Theodore P. Augustinos EDWARDS WILDMAN PALMER LLP Kenneth P. Mortensen CVS/CAREMARK 2013 Edwards Wildman Palmer LLP & Edwards

More information

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY Slide 1 Identity Theft Coverage on Insurance Policies November 8, 2013 Slide 2 What s the big deal? Slide 3 PII Personally Identifiable Information

More information

DATA COMPROMISE COVERAGE FORM

DATA COMPROMISE COVERAGE FORM DATA COMPROMISE DATA COMPROMISE COVERAGE FORM Various provisions in this policy restrict coverage. Read the entire policy carefully to determine rights, duties and what is and is not covered. Throughout

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

An Overview of Cyber Insurance at AIG

An Overview of Cyber Insurance at AIG An Overview of Cyber Insurance at AIG Michael Lee, MBA Cyber Business Development Manager AIG 2018 Brittney Mishler, ARM Cyber Casualty Underwriting Specialist AIG Cyber Insurance It s a peril, not a product

More information

Data Security Breach Handbook Incident Readiness and Response 2016 Edition. Jena Valdetero David Zetoony

Data Security Breach Handbook Incident Readiness and Response 2016 Edition. Jena Valdetero David Zetoony Data Security Breach Handbook Incident Readiness and Response 2016 Edition Jena Valdetero David Zetoony TABLE OF CONTENTS ABOUT THE AUTHORS... iii DATA SECURITY BREACHES: INCIDENT PREPAREDNESS AND RESPONSE...

More information

Show Me the Money! Risk Management for Finance Professionals

Show Me the Money! Risk Management for Finance Professionals Show Me the Money! Risk Management for Finance Professionals By Robin Aronson, JD, CPCU, ARM, AIC Washington Cities Insurance Authority Risk Services Manager What is WCIA? Formed in 1981 Risk Pool Interlocal

More information

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY Coverage under this endorsement is subject to the following: PART 1 RESPONSE

More information

Cyber Enhancement Endorsement

Cyber Enhancement Endorsement Cyber Enhancement Endorsement What is Cyber Risk? Why should I buy Cyber Risk insurance? What is the cost? Why should I buy Great American s product? Who do I contact to learn more about Cyber Risk Insurance?

More information

Cyber Risk Proposal Form

Cyber Risk Proposal Form Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information

More information

INTRODUCTION... ERROR! BOOKMARK NOT DEFINED. YOUR ORGANIZATION... ERROR! BOOKMARK NOT DEFINED. EXPERTISE... ERROR! BOOKMARK NOT DEFINED.

INTRODUCTION... ERROR! BOOKMARK NOT DEFINED. YOUR ORGANIZATION... ERROR! BOOKMARK NOT DEFINED. EXPERTISE... ERROR! BOOKMARK NOT DEFINED. TABLE OF CONTENTS INTRODUCTION... ERROR! BOOKMARK NOT DEFINED. YOUR ORGANIZATION... ERROR! BOOKMARK NOT DEFINED. EXPERTISE... ERROR! BOOKMARK NOT DEFINED. SPECIAL SERVICES... ERROR! BOOKMARK NOT DEFINED.

More information

PRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C.

PRESENTERS. Todd Seiders. Allen R, Wolff, Esq. Director of Loss Control for Petra Risk Solutions. Shareholder, Anderson Kill, P.C. PRESENTERS Todd Seiders Director of Loss Control for Petra Risk Solutions oversees the risk management and claims departments for approximately 3400 hotels, resorts and spas nationwide extensive hands

More information

Electronic Payments: The Winds of Change, A Call to Action. Will 2011 Be An Eventful Year in the History of Payment Card Security?

Electronic Payments: The Winds of Change, A Call to Action. Will 2011 Be An Eventful Year in the History of Payment Card Security? Electronic Payments: The Winds of Change, A Call to Action Will 2011 Be An Eventful Year in the History of Payment Card Security? 1 Presenter W. Stephen Cannon, Chairman, Constantine Cannon LLP Former

More information

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor

Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April Cyber Risks Advisor Cyber Liability & Data Breach Insurance Nikos Georgopoulos Oracle Security Executives Breakfast 23 April 2013 Cyber Risks Advisor 1 Contents Information Age Directive On Network and Information Security

More information

The Standard of Care and its impact on your client communications. DPLE 109 January 2, 2019

The Standard of Care and its impact on your client communications. DPLE 109 January 2, 2019 The Standard of Care and its impact on your client communications DPLE 109 January 2, 2019 1 RLI Design Professionals is a Registered Provider with The American Institute of Architects Continuing Education

More information

EMPLOYEE BENEFITS LIABILITY COVERAGE

EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT PROVIDES CLAIMS-MADE AND REPORTED COVERAGE. PLEASE READ THE ENTIRE ENDORSEMENT CAREFULLY.

More information

UNDERSTANDING HIPAA COMPLIANCE IN 2014: ETHICS, TECHNOLOGY, HEALTHCARE & LIFE

UNDERSTANDING HIPAA COMPLIANCE IN 2014: ETHICS, TECHNOLOGY, HEALTHCARE & LIFE UNDERSTANDING HIPAA COMPLIANCE IN 2014: ETHICS, TECHNOLOGY, HEALTHCARE & LIFE JULIE MEADOWS-KEEFE GROSSMAN, FURLOW, AND BAYÓ, LLC 2022-2 RAYMOND DIEHL RD. TALLAHASSEE, FL. 32308 (850) 385-1314 J.MEADOWS-KEEFE@GFBLAWFIRM.COM

More information

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15) Protected Health Info HIPAA Update: Avoiding Penalties IHCA (7/15) Preliminaries This presentation is similar to any other legal education materials designed to provide general information on pertinent

More information

Alabama Insurance Law Decisions

Alabama Insurance Law Decisions Alabama Insurance Law Decisions 2015 YEAR IN REVIEW Table of Contents UIM Subrogation/Attorney Fee Decision UIM Carrier s Advance of Tortfeasor s Limits CGL Duty to Defend Other Insurance Life Insurance

More information

TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is

TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is under common control with, Donnelley Financial or Client,

More information

Not All Breaches Are Created Equal. Nicholas L. Cramer Director of Data Breach Response

Not All Breaches Are Created Equal. Nicholas L. Cramer Director of Data Breach Response Not All Breaches Are Created Equal Nicholas L. Cramer Director of Data Breach Response Agenda Understanding The New Role of Cyber Insurance 1 st Party Risk vs. 3 rd Party Risk The Go-Live Timeline Interpreting

More information

3 Data Extraction Levels

3 Data Extraction Levels 3 Data Extraction Levels DMS Level Data Extractors Data Broker Extractors 3 rd Party Extractors The Problems DMS unauthorized selling of dealer data to 3 rd parties Data broker extracts unauthorized data

More information

Insurance Buyers News

Insurance Buyers News Insurance Buyers News Springfield PO Box 4207, Springfield, MO 65808 Phone: 800-422-5275 417-887-3550 Fax: 417-887-3252 Rolla PO Box 1258, Rolla, MO 65402-1258 Phone: 800-364-2212 573-364-8888 Fax: 573-341-2257

More information

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Insuring your online world, even when you re offline. Masterpiece Cyber Protection Insuring your online world, even when you re offline Masterpiece Cyber Protection Protect your online information from being an open network 97% of Chubb clients who had a claim paid were highly satisfied

More information

Aon Cyber Risk and Directors & Officers Forum CRM011

Aon Cyber Risk and Directors & Officers Forum CRM011 Aon Cyber Risk and Directors & Officers Forum CRM011 Speakers: Leslie Lamb, Director, Global Risk & Resiliency Management, Cisco Systems Timothy Fletcher, Senior Vice President and Team Leader, Aon Risk

More information

Data Security Breach Handbook For Restaurants and the Food Service Industry 2016 Edition. Jena Valdetero David Zetoony Bryan Cave LLP

Data Security Breach Handbook For Restaurants and the Food Service Industry 2016 Edition. Jena Valdetero David Zetoony Bryan Cave LLP Data Security Breach Handbook For Restaurants and the Food Service Industry 2016 Edition Jena Valdetero David Zetoony Bryan Cave LLP 1 TABLE OF CONTENTS ABOUT THE AUTHORS...ii INTRODUCTION... 1 I. UNDERSTANDING

More information

Cyber insurance: Growing pains. 9 February 2017 Transforming healthcare Michael Schmitt

Cyber insurance: Growing pains. 9 February 2017 Transforming healthcare Michael Schmitt Cyber insurance: Growing pains 9 February 2017 Transforming healthcare Michael Schmitt Cyber Incidents Headlines Target Corporation (2013) 110 Million records compromised $240 million cost of reissuing

More information

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do ARTICLE Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do By Gene Griggs and Saad Gul This article analyzes cybersecurity issues for retirement plans. Introduction

More information

Does it pay to be cyber-insured

Does it pay to be cyber-insured Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks Key issues Where do insurance

More information

Cyber Insurance for Lawyers

Cyber Insurance for Lawyers Cyber Insurance for Lawyers Learn What Most People Don t Know About a Cyber Insurance Policy Cyber Crime Trends NAS Cybercrime 2017 Claims Analysis Report 1 in 4 Claims Exceeding $200,000 Average Cybercrime

More information

AXIS PRO PRIVASURE INSURA

AXIS PRO PRIVASURE INSURA AXIS Insurance Telephone: (678) 746-9000 111 S. Wacker Dr., Ste. 3500 Toll-Free: (866) 259-5435 Chicago, IL 60606 Facsimile: (678) 746-9315 Website: www.axiscapital.com/en-us/insurance/us#professional-lines

More information

Subcontract Agreement

Subcontract Agreement S THIS AGREEMENT made as of the day of, 2012 BETWEEN the Contractor: TCL Partners 5212 123 rd Place SE Everett, WA 98208 and the For the Following Project: The Architect for the Project: The Contractor

More information

Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered?

Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered? Invas ion of Privacy, Hacking and Intellectual Property Claims : Are You Covered? Speakers : Edward M. Joyce, Partner, Jones Day Leslie Lamb, Director Global Risk Management, Cisco Systems, Inc. The views

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage James P. Bobotek james.bobotek@pillsburylaw.com (202) 663-8930 Pillsbury Winthrop Shaw Pittman LLP DOCUMENT

More information

Avoiding the Perils and Pitfalls of The Fair Credit Reporting Act Presented by: Brian G. Muse, Esq. Thomas A. Cohn, Esq.

Avoiding the Perils and Pitfalls of The Fair Credit Reporting Act Presented by: Brian G. Muse, Esq. Thomas A. Cohn, Esq. Avoiding the Perils and Pitfalls of The Fair Credit Reporting Act Presented by: Brian G. Muse, Esq. Thomas A. Cohn, Esq. 02/16/12 Today s presenters and some notes... Thomas Cohn New York Brian Muse Williamsburg

More information

Small business, big risk: Lack of cyber insurance is a serious threat

Small business, big risk: Lack of cyber insurance is a serious threat Small business, big risk: Lack of cyber insurance is a serious threat October 2018 Sean Kevelighan Chief Executive Officer seank@iii.org James Lynch, FCAS, MAAA Chief Actuary jamesl@iii.org Jessica McGregor

More information

TERMS OF USE. Unless otherwise noted, all tickets, goods, and services sold on the TicketBiscuit platform adhere to a NO REFUNDS, NO EXCHANGES policy.

TERMS OF USE. Unless otherwise noted, all tickets, goods, and services sold on the TicketBiscuit platform adhere to a NO REFUNDS, NO EXCHANGES policy. TERMS OF USE Hello & welcome, ticket purchasers! The following Terms of Use govern the use of this site, www.ticketbiscuit.com, www.tututix.com, www.whistletix.com, www.statechamps.com, and www.battlepass.com,

More information

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions

The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions The Risk-based Approach to Data Breach Response Meeting mounting expectations for effective, relevant solutions Our Speakers Mark Melodia is Partner and Co-Head of the Global Data Security, Privacy & Management

More information

Cybersecurity Privacy and Network Security and Risk Mitigation

Cybersecurity Privacy and Network Security and Risk Mitigation Ask the Experts at fi360 2016 Cybersecurity Privacy and Network Security and Risk Mitigation Gary Sutherland, NAPLIA CEO Brian Edelman, Financial Computer Inc. CEO Paul Smith, AIF NAPLIA SVP SEC s 1st

More information

Is the Cyber Exclusion the New Pollution Exclusion?

Is the Cyber Exclusion the New Pollution Exclusion? Is the Cyber Exclusion the New Pollution Exclusion? Presented by: Katherine Henry Brendan Hogan Bradley Arant Boult Cummings LLP Attorney-Client Privilege. Topics for Today s Presentation Pollution exclusion

More information

Defending Litigation After a Data Breach

Defending Litigation After a Data Breach Defending Litigation After a Data Breach November 9, 2016 Stewart Baker Steptoe & Johnson LLP Defending Litigation After a Data Breach Class Action Suits Commonly Filed By: Consumers Financial Institutions

More information

EMPLOYEE BENEFITS LIABILITY COVERAGE

EMPLOYEE BENEFITS LIABILITY COVERAGE POLICY NUMBER: COMMERCIAL GENERAL LIABILITY CG 04 35 12 07 THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. EMPLOYEE BENEFITS LIABILITY COVERAGE THIS ENDORSEMENT PROVIDES CLAIMS-MADE COVERAGE.

More information

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage Presenting a live 90-minute webinar with interactive Q&A Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage THURSDAY, OCTOBER 5, 2017 1pm Eastern 12pm Central

More information

NON-PROFIT INSURANCE 101. Presented by Jamie Saunders and Jeff McCann

NON-PROFIT INSURANCE 101. Presented by Jamie Saunders and Jeff McCann NON-PROFIT INSURANCE 101 Presented by Jamie Saunders and Jeff McCann WORKSHOP OVERVIEW Introduction to the different coverages available to non-profit organizations. Directors & Officers Liability Commercial

More information

Top Ten Things You Should Know About Employee Benefits

Top Ten Things You Should Know About Employee Benefits Top Ten Things You Should Know About Employee Benefits AIDS Legal Referral Panel April 19, 2018 MCLE Training Kirsten Scott Renaker Hasselman Scott, LLP 235 Montgomery Street, Suite 944 San Francisco,

More information

MANAGING DATA BREACH

MANAGING DATA BREACH MANAGING DATA BREACH Beazley is a specialist insurer and leading provider of cyber insurance. Michael Phillips is a Claims Manager in the Technology, Media, and Business division of Beazley, and focuses

More information

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker Safeguarding Your HIPAA and Personal Health Information Data Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker 1 Overview» Patient information confidentiality Grant requirements

More information

HEALTHCARE INDUSTRY SESSION CYBER IND 011

HEALTHCARE INDUSTRY SESSION CYBER IND 011 HEALTHCARE INDUSTRY SESSION CYBER IND 011 Speakers: Jody Westby, Chief Executive Officer, Global Cyber Risk René Siemens, Partner, Covington & Burling LLP Brent Rieth, Senior Vice President and Team Leader,

More information

Narrowing the Scope of Auditor Duties

Narrowing the Scope of Auditor Duties Narrowing the Scope of Auditor Duties David Margulies, J.D. Candidate 2010 The tort of deepening insolvency refers to an action asserted by a representative of a bankruptcy estate against directors, officers,

More information

STATE OF MICHIGAN COURT OF APPEALS

STATE OF MICHIGAN COURT OF APPEALS STATE OF MICHIGAN COURT OF APPEALS FH MARTIN CONSTRUCTION COMPANY, Plaintiff-Appellee, UNPUBLISHED May 11, 2010 v No. 289747 Oakland Circuit Court SECURA INSURANCE HOLDINGS, INC., LC No. 2008-089171-CZ

More information

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor This Addendum is applicable only in those situations where the Selected

More information

THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY CRISIS MANAGEMENT COVERAGE The Insurer shall pay on behalf of the Insured: 1) Crisis Management Expenses that are a direct result of a Network

More information