SlideShare a Scribd company logo
1 of 3
Download to read offline
The Insurance Coverage Law Information Center
The following article is from National Underwriter’s latest online resource,
FC&S Legal: The Insurance Coverage Law Information Center.
CYBER SECURITY AND INSURANCE COVERAGE PROTECTION:
THE PERFECT TIME FOR AN AUDIT
Lynda A. Bennett
February 23, 2015
2014 ended almost the same way that it began for most companies – having concerns about cyber security and hackers.
At the beginning of the year, the news cycle was focused on breaches that took place in the consumer product space as
Target, Michael’s, Neiman Marcus, and Home Depot worked fast and furious to address breaches that led to concerns
about a massive amount of credit card information possibly being “in the open.” Later in the year, we learned that
corporate giants like JPMorgan Chase and Apple were not immune from cyber security breaches as still more personally
identifiable information and very personal photographs were released into the public domain. Finally, as 2014 drew to a
close, the entertainment industry was further rocked by the cyber-attack on Sony Corp., which led to even broader
concerns about national security and terrorist threats.
All of these serious and large-scale risks led many companies to evaluate their current insurance profile, with a specific
eye toward determining how much, if any, insurance coverage they have for cyber liabilities and losses. Many companies
were surprised to learn that their current coverage profile was less than complete. Then they learned that the process of
considering and placing a new, standalone cyber insurance policy is complicated because there are so many different
policy forms on the market today and their current insurance broker relationships may not be sufficient to navigate the
complexities of placing cyber coverage.
Thus, with 2015 underway, now is the perfect time to conduct an audit of your existing insurance program and to address
any gaps in coverage that may exist with respect to cyber risks. To aid in that process, this article provides an overview of
the current state of play for coverage under “traditional” and “new” cyber insurance policies and provides guideposts
that should be followed to avoid unwelcome surprises after a breach has occurred.
Cyber Coverage Is Quickly Disappearing From “Traditional” Insurance Policies
Nearly all companies have commercial general liability insurance (“CGL”), which protects against third party liabilities,
and first party property insurance coverage, which protect personal property and usually provide some form of business
interruption coverage. Most companies are unaware that these “traditional” insurance policies offer very little to no
protection against cyber risks.
The mischief began all the way back in the late 1990s when companies were worried that Y2K would shut down their
computer systems. While companies were spending multimillions of dollars to correct the Y2K problem, the insurance
industry got “out front” on the issue, placing “absolute” Y2K exclusions in their policies and modifying the definition of
property damage to state that electronic information and data did not qualify as covered “tangible” property.
After 2000 came and went, most companies stopped looking at the Y2K exclusion that carried forward into their renewal
policies. Therefore, they did not notice that the Y2K exclusion morphed over time into a broadly worded exclusion that
may bar coverage for a wide variety of electronic-related risks and liabilities. Moreover, last year, the Insurance Services
Office approved the use of a specific “data breach” exclusion in CGL policies that bars coverage for claims arising from
any access to, or disclosure of, any person’s or organization’s confidential or personal information including:
- patents;
- trade secrets;
- processing methods;
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
- customer lists;
- financial information;
- credit card information;
- health information; or
- any other type of nonpublic information.
In short, the insurance industry has taken several and repeated steps to eliminate cyber coverage from “traditional”
insurance policies. Companies currently engaged in the renewal process should be aware of the new ISO exclusion and
should work closely with their insurance professionals to avoid inclusion of this endorsement and/or explore whether it
may be narrowed in scope.
Companies also should keep in mind that “older” CGL policies that do not contain the exclusions discussed above
remain available to respond to claims that are made in 2015 as long as the alleged injuries took place during the “older”
policy periods. When in doubt, provide notice of the claim and work closely with insurance professionals to determine
whether and how far to push for coverage.
Cyber Coverage “With Strings”
Some “traditional” policies may still provide coverage for cyber-related risks but that coverage may be substantially
scaled back through the use of “sub­limits.” Unfortunately, most companies do not appreciate the importance of a
sub-limit until after a loss has occurred and the insurer pays the claim only up to the applicable sub-limit.
By way of example, a professional liability (“E&O”) policy may be sold to a technology-based company showing a $5
million limit of liability. However, further embedded in the declarations page of the policy, the insurer may agree to
cover losses flowing from a data breach or service interruption but the coverage is subject to a $250,000 sublimit (which
oftentimes is inclusive of defense costs). This means that when the company is sued by a client or any other third party
for a hacking event, the maximum amount of insurance coverage available to defend the claim and resolve the loss will
be $250,000 which, as most companies know, is an insignificant amount when dealing with a security breach.
Again, to avoid this kind of unwelcome surprise, companies are well-served to have an insurance professional conduct
a careful audit of the coverage provided.
Stand Alone Cyber Liability Policies – The Future is Now
The erosion, and downright disappearance, of coverage under traditional policies is not an accident. Rather, the
insurance industry wants to isolate and price cyber liability risk separately and issue standalone insurance policies to
cover such risks. This is not a new phenomenon as companies experienced a similar transition when employment
practices and pollution legal liability policies were introduced into the insurance market in the mid to late 1990s.
At present, the cyber insurance liability market is still in the early and developmental stage. Therefore, companies have
many different policy forms to choose from and pricing arrangements are varied. Many cyber policies offer coverage on
a Chinese takeout menu basis where companies must decide which coverages to purchase and whether to agree to
sub-limits on certain of those coverages. The definitions used in the policy forms vary in material ways and the scope of
coverage provided to entities/persons insured is also diverse.
The biggest mistake for a company to make is to assume that its current insurance program is sufficient to cover any
and all cyber risks that may be presented in the future. Indeed, even the newest cyber liability policies must be carefully
scrutinized in the wake of the recent Sony breach, which may have involved an element of terrorism. Some cyber policies
contain a broadly worded “war” exclusion that bars coverage for claims arising out of war, invasion, acts of foreign
enemies, hostilities, warlike operations, and a host of quasi-military related activities.
The best way to ensure that your company is protected against cyber security and hacking risk is to assemble a team of
skilled insurance professionals and conduct a careful audit of existing and available insurance policies.
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
About The Author
Lynda A. Bennett is a partner at Lowenstein Sandler LLP, where she is the chair of the Insurance Coverage Practice and
a member of the Executive Board. She may be contacted at lbennett@lowenstein.com.
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
Copyright © 2015 The National Underwriter Company. All Rights Reserved.
NOTE: The content posted to this account from FC&S Legal: The Insurance Coverage Law Information Center is current to the date of its initial
publication. There may have been further developments of the issues discussed since the original publication.
This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding
that the publisher is not engaged in rendering legal, accounting or other professional service. If legal advice is required, the services of a competent
professional person should be sought.
For more information, or to begin your free trial:
	 • Call: 1-800-543-0874
	 • Email: customerservice@SummitProNets.com
	 • Online: www.fcandslegal.com
FC&S Legal guarantees you instant access to the most authoritative and comprehensive
insurance coverage law information available today.
This powerful, up-to-the-minute online resource enables you to stay apprised
of the latest developments through your desktop, laptop, tablet, or smart phone
—whenever and wherever you need it.

More Related Content

What's hot

IoT Insurance Paradigm
IoT Insurance ParadigmIoT Insurance Paradigm
IoT Insurance ParadigmMatteo Carbone
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
IoT insurance lessons learned
IoT insurance lessons learnedIoT insurance lessons learned
IoT insurance lessons learnedMatteo Carbone
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Insurance IoT is about Value Sharing
Insurance IoT is about Value SharingInsurance IoT is about Value Sharing
Insurance IoT is about Value SharingMatteo Carbone
 
How an insurer can stay relevant in the age of data
How an insurer can stay relevant in the age of dataHow an insurer can stay relevant in the age of data
How an insurer can stay relevant in the age of dataMatteo Carbone
 
Auto Insurers' Memento Mori
Auto Insurers' Memento MoriAuto Insurers' Memento Mori
Auto Insurers' Memento MoriMatteo Carbone
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 
2019 IoT Insurance Observatory
2019 IoT Insurance Observatory2019 IoT Insurance Observatory
2019 IoT Insurance ObservatoryMatteo Carbone
 
The future of Auto insurance
The future of Auto insuranceThe future of Auto insurance
The future of Auto insuranceMatteo Carbone
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskDominika Rusek
 

What's hot (19)

Smart Home Insurance
Smart Home InsuranceSmart Home Insurance
Smart Home Insurance
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
IoT Insurance Paradigm
IoT Insurance ParadigmIoT Insurance Paradigm
IoT Insurance Paradigm
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
IoT insurance lessons learned
IoT insurance lessons learnedIoT insurance lessons learned
IoT insurance lessons learned
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Insurance IoT is about Value Sharing
Insurance IoT is about Value SharingInsurance IoT is about Value Sharing
Insurance IoT is about Value Sharing
 
How an insurer can stay relevant in the age of data
How an insurer can stay relevant in the age of dataHow an insurer can stay relevant in the age of data
How an insurer can stay relevant in the age of data
 
IoT Ins Obs '19
IoT Ins Obs '19IoT Ins Obs '19
IoT Ins Obs '19
 
Auto Insurers' Memento Mori
Auto Insurers' Memento MoriAuto Insurers' Memento Mori
Auto Insurers' Memento Mori
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
2019 IoT Insurance Observatory
2019 IoT Insurance Observatory2019 IoT Insurance Observatory
2019 IoT Insurance Observatory
 
Crime Information Sheet
Crime Information SheetCrime Information Sheet
Crime Information Sheet
 
Ci times issue_165
Ci times issue_165Ci times issue_165
Ci times issue_165
 
AI in Insurance - InView Primer
AI in Insurance - InView PrimerAI in Insurance - InView Primer
AI in Insurance - InView Primer
 
The future of Auto insurance
The future of Auto insuranceThe future of Auto insurance
The future of Auto insurance
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 

Similar to Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit

CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounAlleneMcclendon878
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
P&C Market Outlook: 2020 Insurance Planning Insights
P&C Market Outlook: 2020 Insurance Planning Insights P&C Market Outlook: 2020 Insurance Planning Insights
P&C Market Outlook: 2020 Insurance Planning Insights CBIZ, Inc.
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
Top insurance industry trends 2020
Top insurance industry trends 2020Top insurance industry trends 2020
Top insurance industry trends 2020KristineSheppard
 
Webcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats ReportWebcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats ReportJasonSchupp1
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006JNicholson
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Graeme Cross
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksDavid Chase
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group, Inc.
 

Similar to Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit (20)

CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
P&C Market Outlook: 2020 Insurance Planning Insights
P&C Market Outlook: 2020 Insurance Planning Insights P&C Market Outlook: 2020 Insurance Planning Insights
P&C Market Outlook: 2020 Insurance Planning Insights
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Top insurance industry trends 2020
Top insurance industry trends 2020Top insurance industry trends 2020
Top insurance industry trends 2020
 
Webcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats ReportWebcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats Report
 
Cyberinsurance 111006
Cyberinsurance 111006Cyberinsurance 111006
Cyberinsurance 111006
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017Global Cyber Market Overview June 2017
Global Cyber Market Overview June 2017
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial Risks
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
B crisis
B crisisB crisis
B crisis
 
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
 
Cyber
Cyber Cyber
Cyber
 

More from NationalUnderwriter

Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...
Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...
Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...NationalUnderwriter
 
How to Successfully Navigate the Latest Changes to the Affordable Care Act
How to Successfully Navigate the Latest Changes to the Affordable Care ActHow to Successfully Navigate the Latest Changes to the Affordable Care Act
How to Successfully Navigate the Latest Changes to the Affordable Care ActNationalUnderwriter
 
Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...
Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...
Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...NationalUnderwriter
 
The EU Solvency II Regime for Insurers: An Update on Implementation
The EU Solvency II Regime for Insurers: An Update on ImplementationThe EU Solvency II Regime for Insurers: An Update on Implementation
The EU Solvency II Regime for Insurers: An Update on ImplementationNationalUnderwriter
 
CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...NationalUnderwriter
 
Arbitration in Insurance Coverage Disputes: Pluses and Minuses
Arbitration in Insurance Coverage Disputes: Pluses and MinusesArbitration in Insurance Coverage Disputes: Pluses and Minuses
Arbitration in Insurance Coverage Disputes: Pluses and MinusesNationalUnderwriter
 
Supreme Court of Texas Marries Contractual Limitations to Insurance Policies
Supreme Court of Texas Marries Contractual Limitations to Insurance PoliciesSupreme Court of Texas Marries Contractual Limitations to Insurance Policies
Supreme Court of Texas Marries Contractual Limitations to Insurance PoliciesNationalUnderwriter
 
Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...
Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...
Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...NationalUnderwriter
 
Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...
Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...
Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...NationalUnderwriter
 
New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...NationalUnderwriter
 
Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...
Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...
Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...NationalUnderwriter
 
Class Actions: Insurance Related Claims
Class Actions: Insurance Related ClaimsClass Actions: Insurance Related Claims
Class Actions: Insurance Related ClaimsNationalUnderwriter
 
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...NationalUnderwriter
 
CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...NationalUnderwriter
 
N.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy Case
N.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy CaseN.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy Case
N.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy CaseNationalUnderwriter
 
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...NationalUnderwriter
 
Wisconsin Supreme Court: Pollution Exclusion Bars Coverage for Well Contamin...
Wisconsin Supreme Court:  Pollution Exclusion Bars Coverage for Well Contamin...Wisconsin Supreme Court:  Pollution Exclusion Bars Coverage for Well Contamin...
Wisconsin Supreme Court: Pollution Exclusion Bars Coverage for Well Contamin...NationalUnderwriter
 
New York High Court Finds Lead Exposure Injuries to Children of Different Fam...
New York High Court Finds Lead Exposure Injuries to Children of Different Fam...New York High Court Finds Lead Exposure Injuries to Children of Different Fam...
New York High Court Finds Lead Exposure Injuries to Children of Different Fam...NationalUnderwriter
 
February14 IRS Valentine’s Day Words of Wisdom by Jay Katz
February14 IRS Valentine’s Day Words of Wisdom by Jay KatzFebruary14 IRS Valentine’s Day Words of Wisdom by Jay Katz
February14 IRS Valentine’s Day Words of Wisdom by Jay KatzNationalUnderwriter
 
Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)
Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)
Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)NationalUnderwriter
 

More from NationalUnderwriter (20)

Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...
Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...
Excess and Surplus Lines Law: A 3-State Sample of a Complete State-by-State C...
 
How to Successfully Navigate the Latest Changes to the Affordable Care Act
How to Successfully Navigate the Latest Changes to the Affordable Care ActHow to Successfully Navigate the Latest Changes to the Affordable Care Act
How to Successfully Navigate the Latest Changes to the Affordable Care Act
 
Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...
Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...
Finding in Favor of Insurer, Jury Rejects Homeowners¹ Bid for $600,000 for Wa...
 
The EU Solvency II Regime for Insurers: An Update on Implementation
The EU Solvency II Regime for Insurers: An Update on ImplementationThe EU Solvency II Regime for Insurers: An Update on Implementation
The EU Solvency II Regime for Insurers: An Update on Implementation
 
CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No Action Relief to Commodity Pool Operators with Respect to Cert...
 
Arbitration in Insurance Coverage Disputes: Pluses and Minuses
Arbitration in Insurance Coverage Disputes: Pluses and MinusesArbitration in Insurance Coverage Disputes: Pluses and Minuses
Arbitration in Insurance Coverage Disputes: Pluses and Minuses
 
Supreme Court of Texas Marries Contractual Limitations to Insurance Policies
Supreme Court of Texas Marries Contractual Limitations to Insurance PoliciesSupreme Court of Texas Marries Contractual Limitations to Insurance Policies
Supreme Court of Texas Marries Contractual Limitations to Insurance Policies
 
Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...
Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...
Supreme Court of New Jersey Confirms "Fairly Debatable" Standard for First Pa...
 
Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...
Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...
Pennsylvania Supreme Court Holds Policyholders May Assign Their Statutory Rig...
 
New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...
 
Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...
Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...
Migrating Sand Triggers Separate Policy Limits for CGL Policy¹s Personal Inju...
 
Class Actions: Insurance Related Claims
Class Actions: Insurance Related ClaimsClass Actions: Insurance Related Claims
Class Actions: Insurance Related Claims
 
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad ...
 
CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...
CFTC Grants No-Action Relief to Commodity Pool Operators with Respect to Cert...
 
N.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy Case
N.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy CaseN.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy Case
N.J. Trial Court Applies "Named Storm" Deductible in Superstorm Sandy Case
 
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...
Clarifying Bad Faith Jurisprudence in Virginia, Federal Court Recognizes Bad-...
 
Wisconsin Supreme Court: Pollution Exclusion Bars Coverage for Well Contamin...
Wisconsin Supreme Court:  Pollution Exclusion Bars Coverage for Well Contamin...Wisconsin Supreme Court:  Pollution Exclusion Bars Coverage for Well Contamin...
Wisconsin Supreme Court: Pollution Exclusion Bars Coverage for Well Contamin...
 
New York High Court Finds Lead Exposure Injuries to Children of Different Fam...
New York High Court Finds Lead Exposure Injuries to Children of Different Fam...New York High Court Finds Lead Exposure Injuries to Children of Different Fam...
New York High Court Finds Lead Exposure Injuries to Children of Different Fam...
 
February14 IRS Valentine’s Day Words of Wisdom by Jay Katz
February14 IRS Valentine’s Day Words of Wisdom by Jay KatzFebruary14 IRS Valentine’s Day Words of Wisdom by Jay Katz
February14 IRS Valentine’s Day Words of Wisdom by Jay Katz
 
Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)
Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)
Discharge of Debt Income (from The Tools & Techniques of Income Tax Planning)
 

Recently uploaded

Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
IOS PPT.pptx doctrine of stare decisiss
IOS PPT.pptx  doctrine of stare decisissIOS PPT.pptx  doctrine of stare decisiss
IOS PPT.pptx doctrine of stare decisissPothysVaran1
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toirenelavilla52178
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Jong Hyuk Choi
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327bariajenne
 
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Diamond959916
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...Dr. Oliver Massmann
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfVidit Agrawal
 

Recently uploaded (13)

Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
IOS PPT.pptx doctrine of stare decisiss
IOS PPT.pptx  doctrine of stare decisissIOS PPT.pptx  doctrine of stare decisiss
IOS PPT.pptx doctrine of stare decisiss
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened toENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
ENG7-Q4-MOD3. determine the worth of ideas mentioned in the text listened to
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24Smarp snapshot 200 -- Google Cloud Next '24
Smarp snapshot 200 -- Google Cloud Next '24
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327Power Point Obligations and contracts Article 1313-1327
Power Point Obligations and contracts Article 1313-1327
 
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
Anti-Online Sexual Abuse or Exploitation of Children (OSAEC) and Anti-Child S...
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...OMassmann - Investment into the grid and transmission system in Vietnam (2024...
OMassmann - Investment into the grid and transmission system in Vietnam (2024...
 
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdfAshutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
Ashutosh Yadav v. State of UP 22nd March, 2024 All HC.pdf
 

Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit

  • 1. The Insurance Coverage Law Information Center The following article is from National Underwriter’s latest online resource, FC&S Legal: The Insurance Coverage Law Information Center. CYBER SECURITY AND INSURANCE COVERAGE PROTECTION: THE PERFECT TIME FOR AN AUDIT Lynda A. Bennett February 23, 2015 2014 ended almost the same way that it began for most companies – having concerns about cyber security and hackers. At the beginning of the year, the news cycle was focused on breaches that took place in the consumer product space as Target, Michael’s, Neiman Marcus, and Home Depot worked fast and furious to address breaches that led to concerns about a massive amount of credit card information possibly being “in the open.” Later in the year, we learned that corporate giants like JPMorgan Chase and Apple were not immune from cyber security breaches as still more personally identifiable information and very personal photographs were released into the public domain. Finally, as 2014 drew to a close, the entertainment industry was further rocked by the cyber-attack on Sony Corp., which led to even broader concerns about national security and terrorist threats. All of these serious and large-scale risks led many companies to evaluate their current insurance profile, with a specific eye toward determining how much, if any, insurance coverage they have for cyber liabilities and losses. Many companies were surprised to learn that their current coverage profile was less than complete. Then they learned that the process of considering and placing a new, standalone cyber insurance policy is complicated because there are so many different policy forms on the market today and their current insurance broker relationships may not be sufficient to navigate the complexities of placing cyber coverage. Thus, with 2015 underway, now is the perfect time to conduct an audit of your existing insurance program and to address any gaps in coverage that may exist with respect to cyber risks. To aid in that process, this article provides an overview of the current state of play for coverage under “traditional” and “new” cyber insurance policies and provides guideposts that should be followed to avoid unwelcome surprises after a breach has occurred. Cyber Coverage Is Quickly Disappearing From “Traditional” Insurance Policies Nearly all companies have commercial general liability insurance (“CGL”), which protects against third party liabilities, and first party property insurance coverage, which protect personal property and usually provide some form of business interruption coverage. Most companies are unaware that these “traditional” insurance policies offer very little to no protection against cyber risks. The mischief began all the way back in the late 1990s when companies were worried that Y2K would shut down their computer systems. While companies were spending multimillions of dollars to correct the Y2K problem, the insurance industry got “out front” on the issue, placing “absolute” Y2K exclusions in their policies and modifying the definition of property damage to state that electronic information and data did not qualify as covered “tangible” property. After 2000 came and went, most companies stopped looking at the Y2K exclusion that carried forward into their renewal policies. Therefore, they did not notice that the Y2K exclusion morphed over time into a broadly worded exclusion that may bar coverage for a wide variety of electronic-related risks and liabilities. Moreover, last year, the Insurance Services Office approved the use of a specific “data breach” exclusion in CGL policies that bars coverage for claims arising from any access to, or disclosure of, any person’s or organization’s confidential or personal information including: - patents; - trade secrets; - processing methods; Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
  • 2. - customer lists; - financial information; - credit card information; - health information; or - any other type of nonpublic information. In short, the insurance industry has taken several and repeated steps to eliminate cyber coverage from “traditional” insurance policies. Companies currently engaged in the renewal process should be aware of the new ISO exclusion and should work closely with their insurance professionals to avoid inclusion of this endorsement and/or explore whether it may be narrowed in scope. Companies also should keep in mind that “older” CGL policies that do not contain the exclusions discussed above remain available to respond to claims that are made in 2015 as long as the alleged injuries took place during the “older” policy periods. When in doubt, provide notice of the claim and work closely with insurance professionals to determine whether and how far to push for coverage. Cyber Coverage “With Strings” Some “traditional” policies may still provide coverage for cyber-related risks but that coverage may be substantially scaled back through the use of “sub­limits.” Unfortunately, most companies do not appreciate the importance of a sub-limit until after a loss has occurred and the insurer pays the claim only up to the applicable sub-limit. By way of example, a professional liability (“E&O”) policy may be sold to a technology-based company showing a $5 million limit of liability. However, further embedded in the declarations page of the policy, the insurer may agree to cover losses flowing from a data breach or service interruption but the coverage is subject to a $250,000 sublimit (which oftentimes is inclusive of defense costs). This means that when the company is sued by a client or any other third party for a hacking event, the maximum amount of insurance coverage available to defend the claim and resolve the loss will be $250,000 which, as most companies know, is an insignificant amount when dealing with a security breach. Again, to avoid this kind of unwelcome surprise, companies are well-served to have an insurance professional conduct a careful audit of the coverage provided. Stand Alone Cyber Liability Policies – The Future is Now The erosion, and downright disappearance, of coverage under traditional policies is not an accident. Rather, the insurance industry wants to isolate and price cyber liability risk separately and issue standalone insurance policies to cover such risks. This is not a new phenomenon as companies experienced a similar transition when employment practices and pollution legal liability policies were introduced into the insurance market in the mid to late 1990s. At present, the cyber insurance liability market is still in the early and developmental stage. Therefore, companies have many different policy forms to choose from and pricing arrangements are varied. Many cyber policies offer coverage on a Chinese takeout menu basis where companies must decide which coverages to purchase and whether to agree to sub-limits on certain of those coverages. The definitions used in the policy forms vary in material ways and the scope of coverage provided to entities/persons insured is also diverse. The biggest mistake for a company to make is to assume that its current insurance program is sufficient to cover any and all cyber risks that may be presented in the future. Indeed, even the newest cyber liability policies must be carefully scrutinized in the wake of the recent Sony breach, which may have involved an element of terrorism. Some cyber policies contain a broadly worded “war” exclusion that bars coverage for claims arising out of war, invasion, acts of foreign enemies, hostilities, warlike operations, and a host of quasi-military related activities. The best way to ensure that your company is protected against cyber security and hacking risk is to assemble a team of skilled insurance professionals and conduct a careful audit of existing and available insurance policies. Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
  • 3. About The Author Lynda A. Bennett is a partner at Lowenstein Sandler LLP, where she is the chair of the Insurance Coverage Practice and a member of the Executive Board. She may be contacted at lbennett@lowenstein.com. Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com Copyright © 2015 The National Underwriter Company. All Rights Reserved. NOTE: The content posted to this account from FC&S Legal: The Insurance Coverage Law Information Center is current to the date of its initial publication. There may have been further developments of the issues discussed since the original publication. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting or other professional service. If legal advice is required, the services of a competent professional person should be sought. For more information, or to begin your free trial: • Call: 1-800-543-0874 • Email: customerservice@SummitProNets.com • Online: www.fcandslegal.com FC&S Legal guarantees you instant access to the most authoritative and comprehensive insurance coverage law information available today. This powerful, up-to-the-minute online resource enables you to stay apprised of the latest developments through your desktop, laptop, tablet, or smart phone —whenever and wherever you need it.