Section 4: Cyber Coverage Flashcards
The Need for Cyber Insurance
- Anything internet related has exposure
- Might have exposure through connections to other companies that are taking your personal info
Common Cyber Exposures (6)
RISC WC
- Regulation: Can have losses in multiple jurisdictions
- Internet of Things: Variety of devices are now connecting to the internet and allowing access to your network
- Storage of Data: Data located in a # of different places
- Credit Card Transactions
- Websites and Social Media
- Collection of Private information
Limitations of Traditional Policies (Why Not GL / BOP / CRIME?)
CGL: electronic data is not considered tangible property. Usually contains explicit cyber exclusion
Property: Very limited coverage for Electronic Data and Interruption of Computer Operations
Crime: Not as robust coverage. Not much more than the Computer and Funds Transfer and Fraudulent Impersonation coverages
Cyber Decs (Limits shown, retroactive date, aggregate)
Limits shown indicate that there is coverage. if no limits shown then no coverage for that section
If no retroactive date listed, then the policy may cover full prior acts
Limits may be subject to annual aggregate
Application Definition (3)
Gathers info necessary for underwriter to make a decision
Must be signed by insured
‘
Can include a warranty statement that will cease coverage if misrepresented
Card Company Definition
Any credit card company that requires its merchants to adhere to the Payment Card Industry Data Security Standards
Claim Definition
Written demands for monetary and nonmonetary damages, civil proceedings, requests for mediation or demands for arbitration, and subpoenas seeking content or content-source information.
Computer Program Definition
Set of related electronic instructions, which direct the operation and function of a computer or devices connected to it, which enables toe computer or devices to receive, process, store or send the organization’s electronic data
Computer System Definition
any computer, including transportable or handheld devices, electronic storage devices and related peripheral components
Defense Costs Definition (2)
All reasonable costs, charges, fees, and expenses incurred in investigating, defending, opposing or appealing any claim and the premium for appeal, attachment or similar bonds
Defense costs shall not include any salaries, wages, fees or benefits of employees
Electronic Data Definition of what it doesn’t include
Doesn’t include the organization’s electronic data that is licensed, leased, rented or loaned to others (better covered under a Tech E&O policy
Employee Definition what it doesn’t include
Doesn’t include independent contractors. This may be bad for 1099’d employees that are using company devices
Liability Loss vs Loss
Liability Loss refers to 3rd party claims. Usually excludes expense items because money being paid to a third party
Loss refers to 1st party claims. Usually include expense
Organizations Computer Systems Definition (3 types of computer systems included)
Owned by the organization
Leased by the organization and operated by any insured
Owned and operated by an employee who has agreed in writing to the orgs personal device use policy
Personal Information Definition (6 Types that are included but not limited to)
SPF ABS (sunscreen your abs)
- Social security, DL# or state ID
- Protected Health Information
- Financial account #’s
- Any other nonpublic information as defined in privacy regulations
- Biometric data
- Security codes, passwords, PINS associated with credit, debit or charge card #’s that would allow access to financial institution funds
Privacy Regulations Definition (broadening statement at end of the list of regulations)
Any other similar state, federal or foreign identity theft or privacy statute or regulation
Subsidiary Definition (2 Types qualify)
More than 50% of the outstanding securities or voting rights representing the present right to vote for the election of directors or an equivalent position is owned, in any combination, by the organization
OR
written contract to elect, appoint or designate a majority of the board of directors or equivalent executives
Suit Definition (Definition and what it doesn’t include)
Civil proceeding, not criminal
does not include a civil proceeding seeking recognition and/or enforcement of a foreign money judgment
First Party Loss Exposures (9)
FPWINNDER
- Forensic Analysis
- PCIDSS: must go through the Data Security standard to get certification again after a credit card data is compromised
- Website Vandalism
- Income (business Income): Lost income because data or systems have been compromised
- Notification costs
- Negative publicity
- Denial of service attacks: Hacker pinging system so much that the vendor can’t sell anything through ecommerce portals
- Extortion (cyber) and ransomeware
- ## Repairing or restoring data
4 Available 1st Party Insuring Agreements under “Info Security Protection”
CCyBeR
- Cyber Incident or Info Security Breach Expense
- Cyber Extortion Events
- Replacement or Restoration of Electronic Data
- Business Income and Extra Expense
Cyber Incident Definition
Unauthorized access,
Malicious Code,
Denial of service attack
Information Security Breach Definition (2 types and 1 condition)
Unauthorized access, acquisition, retention or use of
- personal information
- any confidential corporate or proprietary information of any third party that is not available to the general public and which the “insured” has legal obligation to maintain in confidence
Needs to be in care custody or control or org under terms of written contract
Cyber Incident or information security breach expense - Coverage Inclusions (5)
FP NOC
- Forensic Costs
- Public relations firm costs to protect the reputation of the company
- Notification expenses to affected parties in accordance to privacy regulations
- Overtime salaries for employees or fees and costs to hire a call center
- Credit monitoring service
Cyber Extortion Event Definition (2)
Demand for ransom payments made to the organization with the actual or threat of:
- Perpetration of a cyber incident or informed security breach OR
- Theft or use of personal or confidential info