色多多视频

Reinsurance
Explore our offerings

By

XL Catlin

This article is reprinted from the March 2015 issue of Insights, a professional journal by the CPCU Society. It has been reproduced here with permission of the CPCU Society, an affiliate of The Institutes. As cyber security threats continue to increase in frequency and ferocity, companies of all sizes now face serious risks that are both difficult to detect and complicated to remedy. And while recent breaches at large retailers and a prominent movie studio have captured the focus of the media, similar cybercrimes targeting smaller businesses, though far more common, often fail to gain national attention. The average costs incurred because of a cyber security breach are also increasing, as companies have seen nearly a 10 percent jump in the costs of addressing a breach since last year (2014 Ponemon Institute Study). The damages from a cyber security incident can impact all aspects of a business, and the subsequent costs are rarely confined to those of a monetary nature. The range of cyber security risks, although constantly evolving, can be generally categorized as commercial risks, litigation risks, and reputational risks, all of which can result in significant damage to the affected party. To address these potential pitfalls, cyber liability insurance coverage is evolving to cover many of the damages associated with breaches and other cyber liability events. Companies can acquire coverage relating to breach response, cyber extortion, subsequent litigation, and a myriad of other risks. As the refinement of individual products drives down costs, companies must consider reducing their risk profile through the purchase of cyber liability insurance. Although the decision of whether to use cyber liability insurance must be made on an individual basis, businesses of all sizes are finding that the benefits of cyber risk insurance coverage far outweigh its costs. Commercial Risks It is an unfortunate truth that in the immediate aftermath of a cyber security event, a business inevitably has to allocate significant resources simply to identify the source of the breach, ensure that it is no longer ongoing, and upgrade all systems to ward off future attacks. While companies often focus on these initial risks because they are most easily quantifiable, initial triage costs represent just the tip of the iceberg of potential damage stemming from a breach or other cyber security event. Commercial costs, such as the price to acquire new servers, recover damaged information, improve monitoring capabilities, or retain a public relations firm, can be significant risks for an entity. Many companies exist under a false sense of security, believing that since they invest significant resources into cyber security systems, they have a very low risk of experiencing a breach. In fact, the sheer size of a company’s cyber security capabilities is often less important than the company’s ability to adapt, upgrade, and change existing systems. Constantly improving security system components, such as firewalls and encryption software, to stay ahead of sophisticated breaches is an important way to protect sensitive information; companies must not assume they are protected simply because their security systems were top-of-the-line when purchased. While large corporations can be lulled into a false sense of security because of the size and sophistication of their existing security measures, small companies often overlook their cyber security risk because of the erroneous assumption that their diminutive size shields them from cyber criminals. In fact, many cyber security breaches target small to mid-size companies for this very reason. Hackers can easily scan multiple systems and only focus their resources on weaker systems that are easily breached. For this reason, small companies are not immune to cyber risk, but are, in fact, prone to it. Litigation/Regulatory Enforcement Risks The evolving sophistication of the hacking community only increases the likelihood of a targeted cyber attack and forces companies to recognize the importance of protecting their valuable data. Additionally, human error accounts for a large percentage of compromised data resulting from lost laptops and smartphones and/or inadvertent disclosure of sensitive personal or corporate confidential information. Companies in all industries face heightened scrutiny in the regulatory realm because of enhanced enforcement by governmental entities. Nearly every state in the country maintains data breach laws requiring timely notification of individuals whose information may have been compromised as well as adherence to standards imposed by the payment card industry (PCI) for those companies accepting credit cards. Just one security failure or privacy breach could lead to intense regulatory scrutiny and costly civil litigation. On almost a weekly basis, we read about data breaches affecting millions of individuals. However, the future of litigation regarding these breaches is largely unsettled. The main hurdles plaintiffs must overcome in privacy breach litigation are standing and damages. Generally, for a case to survive a motion to dismiss, there must be evidence that information was exploited or compromised. One example is posting victims’ information in a public forum. Some plaintiffs’ attorneys argue that when customers pay for services, there is an implied promise by the defendant to use some of that money to implement cyber security precautions and that, as such, plaintiffs should be compensated. The courts have been somewhat split on the issues of standing and damages, but have usually taken a pro-defendant stance. However, the decision making is very fluid. The most compelling cases involve data breaches that occur after the company either knew there was malware on the system and did not act or was late to know and to notify. Questions are often raised, such as, was there a plan in place? Was the company diligent? And, are they now working to prevent a breach in the future? The wild card in litigation is often statutory damages, as those amounts can far exceed any other damages. Presently, plaintiffs need a consequent. However, at the end of the day, that does not eliminate the fundamental problem (the breach) and whether the courts may start to embrace that standing is still in question. In 2010, an opinion by the United States Court of Appeals for the Ninth Circuit was thought to be precedent setting. In Krottner v. Starbucks Corp. (No. 09-35823), the court reviewed a district court order ruling that plaintiffs whose personal information was stolen—but not yet misused—had suffered an “injury” sufficient to constitute standing under Article III of the U.S. Constitution. While the court of appeals ruled that plaintiffs had standing to bring their lawsuit, it also affirmed the district court’s holding that they failed to adequately state a claim under Washington state law. As such, both of the district court cases were eventually dismissed. Notwithstanding the dismissals, the importance of this ruling was quite significant in illustrating the court’s willingness to uphold the “injury-in-fact” requirement given to a future threat of only credible harm. In a decision issued by the Supreme Court in 2013, the court took an entirely different view to that in Krottner. Specifically, in Clapper v. Amnesty International (No. 10-1025), the court, albeit by a narrow majority, held that mere assertions of reasonable likelihood of potential future injury, or harm or costs incurred to avoid potential threatened injury, were insufficient to establish standing by plaintiffs in federal court. In Clapper, the plaintiffs; attorneys; and human rights, legal, and media organizations whose work required them to communicate with foreign nationals challenged the constitutionality of Section 1881a of the Foreign Intelligence Surveillance Act. This act was signed into law after September 11, 2001, authorizing the government to regulate certain governmental electronic surveillance of communications for foreign intelligence purposes. It was subsequently amended in 2008 to provide that the government may intercept electronic communications of foreign nationals without establishing probable cause. The majority opinion in this case found that “respondents lacked standing because they could not manufacture standing by incurring costs in anticipation of non-imminent harm.” Although not a data breach case, this decision was significant in the continuously developing data breach case law, as it was used by defense counsel to oppose data breach class actions by arguing that there must be actual damages or imminent harm. As further evidence of the unsettled legal landscape in this realm, a 2010 decision handed down by Judge Lucy H. Koh of the Northern District of California in In re Adobe Sys., Inc. Privacy Litig., No. 13-CV-05226-LHK (N.D. Cal. Sept. 4, 2010), found that plaintiffs in a consolidated class action had standing to sue, despite plaintiffs’ failure to allege actual improper use of stolen personal information. This holding is quite significant, as it again shows that the standing debate is far from settled. Specifically, in July of 2013, hackers allegedly targeted Adobe’s servers and spent several weeks undetected, removingcustomer names, login IDs, passwords, credit and debit card numbers, expiration dates, and physical and email addresses. Plaintiffs alleged violations of the California Civil Code in their complaint and sought injunctive and declaratory relief. Based upon defendants’ arguments in Clapper, Adobe moved to dismiss the plaintiffs’ claims, stating that plaintiffs in data breach litigation must assert “certainly impending” injuries and, again, relying on Clapper, that possible future injuries are insufficient. Judge Koh disagreed, finding that Clapper did not change the established standing in Krottner and that, even if Krottner was no longer good law, the harm threatened by the Adobe breach was certainly sufficient and imminent to satisfy Clapper. Further, the court reasoned that requiring plaintiffs to wait until they actually suffer identity theft of potential credit- or debit-card fraud in order to establish standing is counter to the well-established principle that harm need not already occur or be “literally certain” to constitute injury. The court also noted that requiring plaintiffs to wait for threatened harms to materialize in order to bring lawsuits poses a unique standing issue because the potential duration of time that passes between a data breach and actual identity theft provides defendants with the opportunity to argue that thefts are not related to their breach. In addition to potential litigation in the wake of a security incident or privacy breach, a major detriment for businesses facing cyber security breaches is the risk of subsequent regulatory fines and litigation. Currently, the vast majority of states have mandatory compliance standards that set a baseline for how private information must be protected, as well as breach-notification statutes that dictate what must be done following the discovery of a breach. Remaining in compliance with the evolving amalgamation of privacy laws is a significant task; however, ignoring these issues can leave a company facing severe legal consequences. While noncompliance can lead to major problems for a company, compliance with breach-notification statutes also carry costs of their own. Notification of affected parties, as well as the potential for providing future credit monitoring, can quickly amount to millions of dollars, even for mid-size companies. Recently, federal regulatory enforcement actions by the Federal Trade Commission (FTC) and the Department of Health and Human Services have resulted in major fines against companies ranging from hoteliers to healthcare providers. Additionally, state attorneys general have begun bringing suits against the victims of cyber security breaches for noncompliance with state regulations, further increasing the risk of regulatory enforcement actions. Private lawsuits also present a significant risk for a company dealing with a cyber security breach, and some courts have begun to ease the significant barriers to certifying a class action against a breached party. As discussed earlier, in the Adobe case out of California, the court allowed a class action to move forward, even though the individuals who had their information stolen from Adobe could not prove that they had actually been harmed. In allowing a class action despite the lack of specific evidence of damage to the individuals who had been exposed, the court opened the door for a potential onslaught of litigation focusing on cyber security breaches. Further, a company’s internal management of a cyber security situation may give rise to the potential for shareholder derivative suits. While this type of litigation is less prevalent, the recent cases involving Wyndham and Target show that any missteps involved with the ensuing management of a breach may further expose companies to litigation from their own shareholders. While the range of fines and lawsuits following a cyber security event are vast and potentially expensive, procuring cyber liability insurance and working to remain in compliance with all applicable laws greatly reduces the back-end risks associated with breaches. Reputational Risk One of the most enduring risks associated with a cyber liability event is the damage to an entity’s reputation. At a time when privacy is often at the forefront of consumers’ minds, any perception of organizational insecurity can lead to disastrous results for a business. Companies such as Target have reported losses totaling hundreds of millions of dollars in the quarter following cyber security events, and these costs do not take into account the long-term effects of the breach. As consumers become increasingly aware of their own security, they are demanding more protection from those tasked with storing their credit card information, medical records, and other sensitive data. Failure to maintain a strong reputation for security can find companies experiencing an exodus of previously loyal customers. For entities that work solely with other businesses (B2B), the reputational damage arising from a cyber security breach has the potential to bankrupt the company by driving away vendors, partners, and clients. Many businesses are wary to work with companies that may serve as jumping-off points for hackers trying to access larger systems. If hackers can gain access to the files of smaller B2B companies, they may be able to use these companies to breach larger, more extensive systems. Often, the risks of working with a vendor that may have problematic cyber security measures are too great, and larger companies will simply find more secure vendors with better security measures. Risk Mitigation/Risk Transfer With a volatile threat environment coupled with the ever-changing legal and regulatory landscape, companies of all sizes must be prepared for a data breach. Essential preparedness should include either risk mitigation or risk transference. Emerging threats are no longer simply emanating from disgruntled employees looking to publish coworkers’ personal information on social media or from cyber extortionists seeking $50,000 to unlock your network. Instead, attacks are stemming from different constituents, ranging from malicious targeted attacks and foreign espionage to supply chain disruption and careless staff. Also, as discussed above, the regulatory landscape presents several requirements with which companies must comply. For example, the National Institute of Standards and Technology (NIST) framework provides guidelines, as do international requirements and regulation. State attorneys general requirements have become more stringent, and any business that accepts credit cards must comply with PCI standards. In addition, the SEC, Federal Trade Commission, and Office for Civil Rights (OCR) have become increasingly aggressive in leveraging fines and penalties for noncompliance. Accordingly, today’s cyber security insurance responds to these risks. In general, the policies provide both first- and third-party risks. First-party coverage may include business income/extra expense coverage; data asset protection; cyber extortion; and, most importantly, event, or crisis, management. Policies may be tailored to include any or all of these coverages, but nearly all contain event response coverage. Specifically, business income/extra expense coverage provides for loss of business income resulting from a data breach. It may also extend to provide coverage for dependent business interruption if caused by a critical vendor. Data asset protection is afforded as well and typically includes the cost of repairing and restoring computer systems and intangible assets that are corrupted or destroyed by a computer attack. Cyber extortion coverage provides for costs of consultants and extortion monies for threats related to interrupting systems and releasing private information typically targeted by ransomware, which requires payment to unlock the compromised network. The most important first-party coverage is event management, sometimes called crisis management. Encompassed within this coverage are the following costs resulting from a security incident: forensic investigation services, breach notification services (including legal fees and call center services), identity monitoring expenses, and public relations firm retainers. Third-party risks include data breach incidents that result in unauthorized access to information or personally identifiable, nonpublic information, such as bank account numbers, credit card numbers, or Social Security numbers, as well as third-party corporate confidential information. Third-party coverage typically includes privacy liability, privacy regulatory defense costs, and network security liability. Privacy liability provides for defense and liability coverage for failure to prevent unauthorized access, disclosure or collection of confidential information or third-party corporate confidential information, or failure of others to whom you have entrusted such information (such as a data-storage facility, credit card processor, or other critical vendor). It also extends to include liability for failing to properly notify of a privacy breach, with claims typically brought by customers, employees, and trading partners. Privacy regulatory defense costs include costs to defend an action or investigation by a regulator because of a privacy breach, including indemnification for any fines and penalties assessed. These claims are typically brought by an attorney general or the applicable regulatory body, such as the FTC or OCR. Finally, network security liability provides defense costs and liability coverage for failure of system security to prevent or mitigate against a computer attack, including but not limited to spread of a virus or a denial of service. Failure of system security includes failure of written policies and procedures addressing technology use; these claims are typically brought by third parties, customers, and employees. In addition, the policies have expanded to provide coverage for PCI fines and penalties if assessed in a jurisdiction where insurable. As cyber and technology risks continue to evolve, cyber insurance coverage will as well. 色多多视频 companies are continuing to accumulate more actuarial data, based on the loss history of various industries, each corporate customer’s use of technology, and the corporation’s own level of security. Alternatively, if a company chooses not to transfer its risk, several risk mitigation techniques must be considered. Effective contract drafting may help to mitigate risk if designed to include provisions for defense and indemnification, limitations of liability, and mediation or arbitration provisions. Additionally, businesses should review their cyber security posture to ensure that an information security policy is in place. At a minimum, this policy should include an incident response plan (with annual testing), a privacy policy that the legal department keeps current with respect to regulatory requirements and privacy law, and background checks and privacy awareness training for all employees. Companies should also ensure that access to data is contingent on an employee’s role and a strong password management process and that mobile devices connected to a company’s network are secure and employ a data segregation scheme and encryption. Most importantly, all companies should be prepared for security incidents by maintaining agreements with reputational risk advisers and attorneys who are well-versed in privacy law. Ultimately, as businesses of all sizes face increased cyber security threats, they must continually address those risks that have the potential to ruin a company. While preventative measures clearly decrease the risk of a breach, cyber liability insurance coverage also has the potential to greatly reduce a business’s risk profile. As insurance products continue to evolve, all companies must consider purchasing this coverage to protect themselves from increasingly sophisticated cyber liability threats. For more on this topic, the authors suggest the following sources: Sarb Sembhi, “,” ComputerWeekly.com, . National Association of 色多多视频 Commissioners & The Center for 色多多视频 Policy and Research, “,” Nov. 24, 2014,  Law360, “,” September 24, 2014. Ponemon Institute,   

To contact the author of this story, please complete the below form

First Name is required
Last Name is required
Country is required
Invalid email Email is required
 
Invalid Captcha
Subscribe
Subscribe to Fast Fast Forward

Global Asset Protection Services, LLC, and its affiliates (鈥溕喽嗍悠礡isk Consulting鈥) provides risk assessment reports and other loss prevention services, as requested. In this respect, our property loss prevention publications, services, and surveys do not address life safety or third party liability issues. This document shall not be construed as indicating the existence or availability under any policy of coverage for any particular type of loss or damage. The provision of any service does not imply that every possible hazard has been identified at a facility or that no other hazards exist. 色多多视频Risk Consulting does not assume, and shall have no liability for the control, correction, continuation or modification of any existing conditions or operations. We specifically disclaim any warranty or representation that compliance with any advice or recommendation in any document or other communication will make a facility or operation safe or healthful, or put it in compliance with any standard, code, law, rule or regulation. Save where expressly agreed in writing, 色多多视频Risk Consulting and its related and affiliated companies disclaim all liability for loss or damage suffered by any party arising out of or in connection with our services, including indirect or consequential loss or damage, howsoever arising. Any party who chooses to rely in any way on the contents of this document does so at their own risk.

US- and Canada-Issued 色多多视频 Policies

In the US, the 色多多视频insurance companies are: Catlin 色多多视频 Company, Inc., Greenwich 色多多视频 Company, Indian Harbor 色多多视频 Company, XL 色多多视频 America, Inc., XL Specialty 色多多视频 Company and T.H.E. 色多多视频 Company. In Canada, coverages are underwritten by XL Specialty 色多多视频 Company - Canadian Branch and AXA 色多多视频 Company - Canadian branch. Coverages may also be underwritten by Lloyd’s Syndicate #2003. Coverages underwritten by Lloyd’s Syndicate #2003 are placed on behalf of the member of Syndicate #2003 by Catlin Canada Inc. Lloyd’s ratings are independent of AXA XL.
US domiciled insurance policies can be written by the following 色多多视频surplus lines insurers: XL Catlin 色多多视频 Company UK Limited, Syndicates managed by Catlin Underwriting Agencies Limited and Indian Harbor 色多多视频 Company. Enquires from US residents should be directed to a local insurance agent or broker permitted to write business in the relevant state.