36
Cyber Insurance Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

Embed Size (px)

Citation preview

Page 1: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

Cyber Insurance

Presented by:Paul J. Miola, CPCU, ARM

Executive DirectorOctober, 2013

Page 2: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

2

Goes by various names – “Information Security Insurance”, “Network Security Insurance”, “Privacy Insurance”, “Data Breach Insurance”, “Network Breach Insurance”, “Technology Solutions”, “Cyber Liability”, “Breach Response Insurance”…

What Is Cyber Insurance?

Page 3: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

3

General Liability Insurance doesn’t respond to cyber claims Typical CGL policy defines “property damage” as “physical

injury to tangible property, including all resulting loss of use of that property.

Some CGL policy forms specifically exclude electronic data from their definition of “property damage.” In such policies, “electronic data” is generally defined as the “information, facts or programs stored as or on, created or used on, or transmitted to or from computer software.”

Data, web pages and computer systems do not constitute tangible property because they are not capable of being touched, held or sensed by the human mind.

3

Why Cyber Insurance?

Page 4: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

4

In the event of a data breach: Notify Employees Notify members of public Notify regulators

• State/Multi State• Federal

• Additional efforts

You Have Added Responsibilities

Who has to do this?

Page 5: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

5

Responsibility lies with the offending entity

You Do!

Page 6: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

6

Not just insurance coverage Claims for damages by third parties

A variety of services Designed to prevent claims Respond on your behalf Deal with regulators

Make sure you comply• Handle Public Relations

Cyber InsuranceSpecialized Coverage

Takes the burden off of you

Page 7: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

7

Cyber claims are infrequent but they do occur

Big name companies are targets but you represent low hanging fruit Lack of formal security and “Privacy

Policies” What if it happens to you? Will you know what to do?

Cyber Risks Are Real

Page 8: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

8

If you pass along a virus or other type of malware, even unknowingly, especially if another entity's customer information is then compromised.

What Could Go Wrong?

Page 9: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

9

If an employee gains unauthorized access to another entity's information or if confidential information is disclosed or misused.

What Could Go Wrong?

Page 10: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

10

If an employee knowingly or unwittingly slanders another entity in a blog, e-mail, or in a social media or forum post, or infringes on copyrighted material.

What Could Go Wrong?

Page 11: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

11

If you do not follow federal or state regulations controlling notification of members of the public/employees whose personal data has been compromised.

What Could Go Wrong?

Page 12: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

12

Breach occurs when an unauthorized 3rd party accesses your network or the network becomes infected with a virus or a denial of service attack.

What Is A Data Breach?

Page 13: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

13

Data can be stolen that can help criminals access PII*. PII is a legal concept, not a technical concept. PII can be exploited by criminals to stalk or

steal the identity of a person, or to aid in the planning of criminal acts.

PII has become much more important as information technology and the Internet have made it easier to collect PII through breaches of internet security, network security and web browser security, leading to a profitable market in collecting and reselling PII.

What Can Happen?

*Personally Identifiable Information

Page 14: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

14

What’s It Going to Cost?

And who pays for it?

Page 15: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

15

Who You Gonna Call?

Ghost Busters?

Page 16: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

16

In The Event of A Breach(Or a suspected Breach)

Immediately dial theXL Data Breach Hotline

1-855-566-4724

This is EXTREMELY IMPORTANT!Keep the number handy!

Page 17: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

17

XL Data Breach HotlineImmediate Triage Assistance

Nelson, Levine, deLuca, & Hamilton

They will guide you.

Page 18: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

18

Report The ClaimTime is of The Essence!

[email protected] contact Qual-Lynx.

Page 19: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

19

Data Recovery◦ Expenses required to

replace, recreate, restore or repair the Insured’s network or information residing on the network to substantially the form in which it existed immediately prior to a breach.

What’s Covered…

Page 20: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

20

Cyber Extortion Coverage provided to reimburse

an Insured the amounts paid to avert a credible threat to commit or continue a network attack against the insured or to disclose personally identifiable information

What’s Covered…

Page 21: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

21

Data Breach Response Costs PCI-DSS Response

Reimburse the Insured for the costs incurred following a breach of private information. Typically costs are provided on a sub-limited basis.

Reimburse the Insured for the costs in incurs to respond to a PCI-DSS incident.

• Forensics costs

• Public relations costs

• Legal

• Mandatory notification costs

• Voluntary notification costs

• Credit monitoring

• Call center

• Breach coach costs

• Independent forensic investigation

conducted by a Payment Card Industry

Forensic Investigator (PFI);

• Attorney fees

• fines and penalties owed by the

Insured under the terms of a Merchant

Services Agreement Fees.

Crisis Management Coverage

.

Page 22: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

22

Data Breach Response Costs PCI-DSS Response

Reimburse the Insured for the costs in incurs following a breach of private information. Typically costs are provided on a sublimited basis.

Reimburse the Insured for the costs incurred to respond to a PCI-DSS incident.

• Forensics costs

• Public relations costs

• Legal

• Mandatory notification costs

• Voluntary notification costs

• Credit monitoring

• Call center

• Breach coach costs

• Independent forensic investigation

conducted by a Payment Card Industry

Forensic Investigator (PFI);

• Attorney fees

• fines and penalties owed by the

Insured under the terms of a Merchant

Services Agreement Fees.

Crisis Management Coverage.

Page 23: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

23

Data Breach Response Costs PCI-DSS Response

Reimburse the Insured for the costs incurred following a breach of private information. Typically costs are provided on a sub-limited basis.

Reimburse the Insured for the costs incurred to respond to a PCI-DSS incident.

• Forensics costs

• Public relations costs

• Legal

• Mandatory notification costs

• Voluntary notification costs

• Credit monitoring

• Call center

• Breach coach costs

• Independent forensic investigation

conducted by a Payment Card Industry

Forensic Investigator (PFI);

• Attorney fees

• fines and penalties owed by the

Insured under the terms of a Merchant

Services Agreement Fees.

Crisis Management Coverage

Page 24: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

24

Network Security Liability Privacy Liability

Failure by the Insured to prevent a network breach which results in:

1. the inability of an authorized user

to gain access to the network;

2. the alteration, addition to,

copying, destruction, deletion,

disclosure, damage or removal of

any data residing on the network;

3. a denial of service attack against

Internet sites or computers;

4. the transmission of a computer

virus from the network to third-

party networks or Internet sites;

Coverage for claim arising from third parties for allegations of:

1. violation of privacy torts, law and

regulations (GLB, HIPAA, COPPA)

2. theft, loss, unauthorized disclosure

of personally identifiable

information private information

3. alterations, corruption,

destruction, deletion or damage to

private information

• Includes both online and off-line

data

Third Party Liability Coverage

.

Page 25: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

25

Network Security Liability Privacy Liability

Failure by the Insured to prevent a network breach which results in:

1. the inability of an authorized user

to gain access to the network;

2. the alteration, addition to,

copying, destruction, deletion,

disclosure, damage or removal of

any data residing on the network;

3. a denial of service attack against

Internet sites or computers;

4. the transmission of a computer

virus from the network to third-

party networks or Internet sites;

Coverage for claim arising from third parties for allegations of:

1. violation of privacy torts, law and

regulations (GLB, HIPAA, COPPA)

2. theft, loss, unauthorized disclosure

of personally identifiable

information private information

3. alterations, corruption,

destruction, deletion or damage to

private information

• Includes both online and off-line

data

Third Party Liability Coverage

.

Page 26: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

26

Network Security Liability Privacy Liability

Failure by the Insured to prevent a network breach which results in:

1. the inability of an authorized user

to gain access to the network;

2. the alteration, addition to,

copying, destruction, deletion,

disclosure, damage or removal of

any data residing on the network;

3. a denial of service attack against

Internet sites or computers;

4. the transmission of a computer

virus from the network to third-

party networks or Internet sites;

Coverage for claim arising from third parties for allegations of:

1. violation of privacy torts, law and

regulations (GLB, HIPAA, COPPA)

2. theft, loss, unauthorized disclosure

of personally identifiable

information private information

3. alterations, corruption,

destruction, deletion or damage to

private information

• Includes both online and off-line

data

Third Party Liability Coverage

Page 27: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

27

Defense Provides defense costs resulting from a regulatory

investigation or proceeding. Typical enforcement comes from the FTC or AGs.

FTC can charge defendants with violating of Section 5 of the FTC Act, which bars unfair and deceptive acts and practices in or affecting commerce.

As of May 1, 2011, the FTC has brought 32 legal actions against organizations that have violated consumers’ privacy rights, or misled them by failing to maintain security for sensitive consumer information.

Regulatory Coverage

Page 28: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

28

Covers the content the Insured disseminates through various means including social media for a defined list of covered perils. Intellectual property

infringement Defamation Other personal injury torts

Media Coverage

Page 29: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

29

Third Party Coverage: Media Liability, Network Security and

Privacy Liability $1,000,000 per claim $3,000,000 annual aggregate $10,000 deductible each claim

Regulatory Fines and Penalties sub limit of $500,000

Retroactive date January 1, 2013

Summary of ACM JIF Cyber Risk Coverage

Limits:

Page 30: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

30

First Party Coverage: Notification Costs, Extortion Threat,

Crisis Management and Business Interruption $500,000 per claim limit $3,000,000 annual aggregate $10,000 deductible each claim

Summary of ACM JIF Cyber Risk Coverage

Limits:

Page 31: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

31

Data Breach Hotlineo 1-888-566-4724o Service Provided by Nelson, Levin,

deLuca & Horst eRisk Hub

◦ Go to https://www.eriskhub.com/xl.php◦ Complete Registration Form◦ Access Code – 10448◦ Once Registered your have immediate

access to the portal with User ID & password created during registration

Value Added Services

Page 32: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

32

Page 33: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

33

Page 34: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

34

Page 35: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

35

What Else?

Much

Much

More

Page 36: Presented by: Paul J. Miola, CPCU, ARM Executive Director October, 2013

Jim PrendergastPartner

Nelson Levine de Luca & [email protected]

www.nldhlaw.com

After The Break…Cyber Liability Risk Management