BreachExchange mailing list archives
Ensuring the right insurance coverage for data breaches
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 13 Oct 2014 18:55:26 -0600
http://www.insidecounsel.com/2014/10/13/ensuring-the-right-insurance-coverage-for-data-bre The chief information officer (CIO) was at the CEO’s office door when she arrived for work that Monday morning. Before the CEO could get through the door, the CIO informed her that over the weekend the company’s computer system had been hacked. “We are investigating the scope of the breach and repair of the system which is down. We are trying to determine the scope of the loss of data, but we are afraid that the hackers obtained access to customer information including customer credit card and other private financial information.” The CEO called in all the C-level officers to discuss the data breach and all that would need to be addressed. The meeting produced a to-do list as follows: 1- Investigation of the cause of the breach, repair of the system and the installation of new and better security software 2- Restoration of the lost data or recreation of the data, if possible 3- The duration of business interruption and the estimated time necessary to get the operating system functioning properly 4- The retention of a public relations (crisis management) firm to assist in creating and the communication of the breach to customers and the public 5- The company’s legal exposure to customers whose data was obtained, possible shareholders claims and any claims the company may have against its outside consulting firm that designed the operating system 6- The scope of insurance coverage for losses and expenses incurred in connection with the data breach and legal exposure to third parties The general counsel was assigned Nos. 4 and 5 on the list. He left the meeting and immediately met with outside counsel to discuss the exposure to customers for invasion of privacy claims and potential class actions that could be filed. They also discussed potential claims against management if it was determined that the operating system did not have state of the art security against cyber-attacks. The general counsel also met with the company’s risk manager and insurance broker. In that meeting, the general counsel received some very disturbing information. The company was currently in discussions with a number of insurers to purchase a cyber insurance policy but had not yet purchased a policy. After calming his nerves, the GC asked what a cyber insurance policy would cover. The broker told him the basic features of the policies under consideration: 1- Reimbursement of expenses and costs of investigation with respect to the cause of the breach, public relations professionals engaged to mitigate financial harm, and the restoration or recreation of the electronic data 2- Losses resulting from business interruption as a result of the breach 3- Defense, loss, damages, costs and expenses of third-party claims arising out of invasion of privacy or any theft of personal and confidential data The broker called his coverage counsel and together they informed the GC that there may be coverage for third-party claims by customers or shareholders under the company’s current general liability policy, directors and officers (D&O) policy and crime coverages. First-party claims for losses to the company from the data breach may be covered under the property policy and business interruption policy. They told the GC that they would immediately review the policies and provide him with a more definitive response. Comprehensive general liability (CGL) policies are the bedrock of commercial insurance and cover property damage and bodily injury claims. They also include coverage for various offenses, including invasion of privacy. Depending on the wording of the invasion of privacy offense, and absent an exclusion for losses resulting from cyber-attack or data beaches, (new policies may exclude claims arising out of data breach since insurers generally exclude claims covered under policies that are written for specific risks), a CGL policy should cover invasion of privacy claims arising out of data breach. D&O policies provide coverage for the directors and officers of a corporation and possibly the corporation itself for wrongful acts defined broadly to include acts, errors or omissions. Obviously, a claim for invasion of privacy arising out of a data breach would be based upon a contention that the entity did not take adequate steps (an omission) to protect its system from hacking which resulted in the data breach and the dissemination of customers’ private information. Such a claim by shareholders, again, absent an exclusion for claims arising out of data breaches, would likely be covered under a D&O policy. As to claims by customers for invasion of privacy, D&O policies exclude invasion of privacy claims. Commercial crime policies may also provide coverage for losses resulting from data breaches. They often include computer fraud coverage for loss or damage to property resulting from the use of a computer to fraudulently transfer that property. This coverage is found in fidelity policies such as banker’s blanket bonds and other crime policies issued to financial institutions and businesses. Insurers construe this policy to provide coverage for losses resulting from computer hacking. First-party losses for repair and replacement of the operating system and business interruption losses resulting from the system going down may be covered under the company’s property and business interruption policies. Courts have found that damage to or corruption of data is property damage. Again, absent exclusions for damage to data or computer systems, these policies may provide coverage. Many insurers now offer cyber insurance policies with the first- and third-party features outlined above. Considering the prevalent risk of cyber-attack, these policies will soon become a part of the insurance program of all major businesses. The likely inclusion of exclusions in traditional policies for losses resulting from cyber-attacks and data breaches will necessitate the purchase of cyber insurance. All of the foregoing information was provided to the GC, who in turn informed the CEO and crises management team. They braced themselves for the onslaught of claims arising out of the cyber-attack. The GC recommended the consideration of establishing a fund to compensate their customers from losses resulting from the data breach. The GC was tasked with providing the team with the details of a plan and the identity of neutrals who could administer the claims process to determine the legitimacy of the claim and the extent of the loss. The GC consulted with the company’s insurers in order to preserve the claim for coverage under the company’s existing coverages. A meeting with the insurers and neutral to design the process was immediately scheduled. Following the meeting, the claim and settlement fund was established and announced to customers and the public.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Ensuring the right insurance coverage for data breaches Audrey McNeil (Oct 20)