Chapter 7 Flashcards

1
Q

Under a commercial property broad form, a data problem is defined as what?

A

-Erasure, destruction, corruption, misappropriation, or misinterpretation of data
-Error in creating, amending, entering, deleting, or using data
-In ability to receive, transmit, or use data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain equipment breakdown insurance

A

-Cover property directly damaged in an accident
-Equipment increasing relies on technology, information systems, and the internet to operate, and is vulnerable to cyber attack
-Some EBI policies offer cyber coverage (some don’t), but there is no standardized coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain identity fraud coverage

A

-Widely available, but awareness is low
-May be offered as endorsement on habitational insurance or included as a basic coverage
-Insurers focus on prevention, restoration, and recovery services while direct losses are not covered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain cyber policy basics

A

-Claims-made basis of coverage
-Some policies have no coverage prior to a retroactive date, while others offer full prior acts coverage
-Provides two types of coverage: first-party coverages (expense driven coverages) and third-party coverages (liability coverages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define claims-made basis

A

A provision in some insurance and reinsurance contracts covering only claims made during the term of the contract

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define retroactive date

A

A provision in some liability policies written on a claims-made basis that prohibits claims for instance that happened prior to the stated date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define prior acts coverage

A

Liability insurance coverage for claims arising from acts that occurred before the beginning of the policy period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some expenses under the expense coverages (first party) in a cyber policy?

A

Notification costs
Forensic investigation costs
Business interruption costs
Crisis management expenses
Data restoration costs
Cyber extortion costs
Regulatory proceedings costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain notification costs

A

The cost associated with letting all of those affected by the breach know that it has occurred. This includes cost such as mailing campaign, credit monitoring, and call centres to handle questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain forensic investigation costs

A

The cost associated with higher professional third-party to determine where, when, and how the breach occurred. Investigative costs are often a costly part of responding to a breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain business interruption costs

A

The cost associated with loss income as a result of the breach during the period of restoration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain crisis management expenses

A

The cost incurred in hiring a professional team to help prevent reputational harm to the business. This can include a public relations team, a lawyer to draft a press release, and other crisis management professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain data restoration costs

A

The cost to restore the network and data to the point that they were at before the event occurred. Cost can include both hardware and software replacement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain cyber extortion costs

A

The cost to respond to a demand for compensation to stop the attacked. Most extortion demands are made in bitcoin or another cryptocurrency because is untraceable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain regulatory proceedings costs

A

The cost associate with being called in front of a civil, administrative, or regulatory proceeding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What coverages fall under liability coverages (third party) in a cyber policy?

A

Network security liability
Privacy liability
Internet media liability

17
Q

Explain Network security liability

A

This covers damages and claims expenses associated with the unauthorized access to, degradation of, or disruption to the insured net network through the use of malware, denial of service attacks, phishing, and other cyber attacks that cause loss

18
Q

Explain privacy liability

A

This covers the unauthorized collection disclosure, use, access, destruction, or modification of personal, protected information

19
Q

Explain internet media liability

A

This refers to liability resulting from allegations of infringement of privacy, defamation, disparagement, piracy, copyright infringement, and so on

20
Q

Define sublimit

A

A limitation in an insurance policy on the amount of coverage available to cover a specific type of loss

21
Q

What other types of coverages are available to be added to a cyber policy to be tailored to that insured

A

Reputational harm
Social engineering fraud
Contingent supply chain coverage
Contingent business interruption
Crime coverage
Hardware “bricking”

22
Q

Define bricking

A

Refers to the loss of functionality of a hardware device that has been damaged beyond repair following a cyber attack

23
Q

Explain the evolution of cyber coverage

A

-Cyber insurance is a relatively new and evolving market
-As technology changes, so do cyber exposures
-As new types of losses happen because of evolving cyber risks, cyber coverage must evolve as well
-A few insures globally have begun to offer coverage that addresses risks of equipment failure, property damage, and bodily injury from a cyber attack

24
Q

Explain Internet of Things (IoT)

A

-Is the interconnection via the Internet of devices with embedded electronics sensors for; example smart watches, thermostats, and cars
-This interconnection allows information to be transmitted between the devices and external sources and facilitates other functions and analysis
-Because of their nature devices can also present exposure or the possibility of injury or property damage
-Devices have been designed with purpose, not security and thus are inherently vulnerable

25
Q

What are common cyber insurance exclusions?

A

-Lost intellectual property: a work or intervention that is the result of creativity including patents, copyright, trademarks, and trade secrets
-Contractual liability
-Acts of God
-Vicarious liability
-War and terrorism
-Bodily injury
-Reputational damage
-Bodily injury and property damage