Section 4: Cyber Coverage Flashcards

1
Q

The Need for Cyber Insurance

A
  • Anything internet related has exposure
  • Might have exposure through connections to other companies that are taking your personal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common Cyber Exposures (6)

A

RISC WC
- Regulation: Can have losses in multiple jurisdictions
- Internet of Things: Variety of devices are now connecting to the internet and allowing access to your network
- Storage of Data: Data located in a # of different places
- Credit Card Transactions
- Websites and Social Media
- Collection of Private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Limitations of Traditional Policies (Why Not GL / BOP / CRIME?)

A

CGL: electronic data is not considered tangible property. Usually contains explicit cyber exclusion

Property: Very limited coverage for Electronic Data and Interruption of Computer Operations

Crime: Not as robust coverage. Not much more than the Computer and Funds Transfer and Fraudulent Impersonation coverages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyber Decs (Limits shown, retroactive date, aggregate)

A

Limits shown indicate that there is coverage. if no limits shown then no coverage for that section

If no retroactive date listed, then the policy may cover full prior acts

Limits may be subject to annual aggregate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Definition (3)

A

Gathers info necessary for underwriter to make a decision

Must be signed by insured

Can include a warranty statement that will cease coverage if misrepresented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Card Company Definition

A

Any credit card company that requires its merchants to adhere to the Payment Card Industry Data Security Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Claim Definition

A

Written demands for monetary and nonmonetary damages, civil proceedings, requests for mediation or demands for arbitration, and subpoenas seeking content or content-source information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer Program Definition

A

Set of related electronic instructions, which direct the operation and function of a computer or devices connected to it, which enables toe computer or devices to receive, process, store or send the organization’s electronic data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer System Definition

A

any computer, including transportable or handheld devices, electronic storage devices and related peripheral components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defense Costs Definition (2)

A

All reasonable costs, charges, fees, and expenses incurred in investigating, defending, opposing or appealing any claim and the premium for appeal, attachment or similar bonds

Defense costs shall not include any salaries, wages, fees or benefits of employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Electronic Data Definition of what it doesn’t include

A

Doesn’t include the organization’s electronic data that is licensed, leased, rented or loaned to others (better covered under a Tech E&O policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Employee Definition what it doesn’t include

A

Doesn’t include independent contractors. This may be bad for 1099’d employees that are using company devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Liability Loss vs Loss

A

Liability Loss refers to 3rd party claims. Usually excludes expense items because money being paid to a third party

Loss refers to 1st party claims. Usually include expense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizations Computer Systems Definition (3 types of computer systems included)

A

Owned by the organization

Leased by the organization and operated by any insured

Owned and operated by an employee who has agreed in writing to the orgs personal device use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Personal Information Definition (6 Types that are included but not limited to)

A

SPF ABS (sunscreen your abs)
- Social security, DL# or state ID
- Protected Health Information
- Financial account #’s
- Any other nonpublic information as defined in privacy regulations
- Biometric data
- Security codes, passwords, PINS associated with credit, debit or charge card #’s that would allow access to financial institution funds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privacy Regulations Definition (broadening statement at end of the list of regulations)

A

Any other similar state, federal or foreign identity theft or privacy statute or regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Subsidiary Definition (2 Types qualify)

A

More than 50% of the outstanding securities or voting rights representing the present right to vote for the election of directors or an equivalent position is owned, in any combination, by the organization

OR

written contract to elect, appoint or designate a majority of the board of directors or equivalent executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Suit Definition (Definition and what it doesn’t include)

A

Civil proceeding, not criminal

does not include a civil proceeding seeking recognition and/or enforcement of a foreign money judgment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

First Party Loss Exposures (9)

A

FPWINNDER

  • Forensic Analysis
  • PCIDSS: must go through the Data Security standard to get certification again after a credit card data is compromised
  • Website Vandalism
  • Income (business Income): Lost income because data or systems have been compromised
  • Notification costs
  • Negative publicity
  • Denial of service attacks: Hacker pinging system so much that the vendor can’t sell anything through ecommerce portals
  • Extortion (cyber) and ransomeware
  • ## Repairing or restoring data
20
Q

4 Available 1st Party Insuring Agreements under “Info Security Protection”

A

CCyBeR

  • Cyber Incident or Info Security Breach Expense
  • Cyber Extortion Events
  • Replacement or Restoration of Electronic Data
  • Business Income and Extra Expense
21
Q

Cyber Incident Definition

A

Unauthorized access,

Malicious Code,

Denial of service attack

22
Q

Information Security Breach Definition (2 types and 1 condition)

A

Unauthorized access, acquisition, retention or use of

  • personal information
  • any confidential corporate or proprietary information of any third party that is not available to the general public and which the “insured” has legal obligation to maintain in confidence

Needs to be in care custody or control or org under terms of written contract

23
Q

Cyber Incident or information security breach expense - Coverage Inclusions (5)

A

FP NOC

  • Forensic Costs
  • Public relations firm costs to protect the reputation of the company
  • Notification expenses to affected parties in accordance to privacy regulations
  • Overtime salaries for employees or fees and costs to hire a call center
  • Credit monitoring service
24
Q

Cyber Extortion Event Definition (2)

A

Demand for ransom payments made to the organization with the actual or threat of:
- Perpetration of a cyber incident or informed security breach OR
- Theft or use of personal or confidential info

25
Q

Cyber Extortion Expenses (3)

A
  • Interest costs
  • Reward Payments
  • Any other reasonable expenses incurred with written consent of insurer
26
Q

Data Restoration Expense Definition (1 definition and 3 exclusions)

A
  • Costs to replace or restore the orgs electronic data or computer programs stored within the orgs computer system to previous condition as well as costs of data entry, reprogramming and computer consultation services

Does not include
- Research duplication that lead to data (should be stored in back-up)
- Security Improvements
- System improvements / repairs

27
Q

Period of Restoration for Cyber BI

A

180 Days

28
Q

3rd Party Exposures (5)

A

WWIRE
- Wrong recipient
- Website Infected
- Infringement issues (copyright and intellectual property rights)
- Regulatory issues
- Emails infected

29
Q

4 Third Party Insuring Agreements Under Information Security Protection Cyber Policy

A

CybeR Money Payments (to others)

Cyber Incident or Information Security Breach Liability

Regulatory Proceeding Liability

Media Liability

Payment Card Industry Liability

30
Q

Cyber Incident or Information Security Breach Liability (What 3rd Covers and Interrelated Wrongful Acts Def)

A

Forensic and other expenses for wrongful acts that insured legally obligated to pay

Interrelated wrongful acts means all casually connected wrongful acts arising out of the same or substantially the same facts, circumstances or allegations which are the subject of or the basis for any claim

31
Q

Regulatory Proceeding Liability (Includes 2 and excludes 3)

A
  • Sum of money an org is legally obligated to DEPOSIT IN A FUND as equitable relief for the payment of consumer claims due to a settlement or an adverse judgment resulting from a claim OR
  • FINES or penalties against org from gov agency

Doesn’t include
- UNINSURABLE: Any amounts that are uninsurable under the law pursuant to which this policy shall be construed
- PROFITS: or advantage the org was not legally entitled to
- FEES - Chargebacks, interchange fees or rates, discount fees, processing fess or any costs to replace payment cards

32
Q

Payment Card industry Costs (4 things it pays, 4 things it doesn’t pay)

A

Pays (PCMA) = Payment Card Money Amounts

  • Punitive, exemplary and multiple damages
  • Compensatory awards or judgments
  • Monetary Settlements
  • Assessments (card reissuance costs and fraud recoveries), and contractual fines or penalties under terms of payment card service agreement

Doesn’t pay: (TUF P = TUF that Payment card doesn’t pay these)
- TAXES, fines, penalties or assessments imposed by law, other than punitive
- UNINSURABLE(any) amounts that are under the law pursuant
- FEES- Interchange fees or rates, discount fees, processing fees
- Restitution, disgorgement, royalties, unjust enrichment, PROFITS insured didn’t earn

33
Q

Media Liability Definition and 4 things covers

A

Any errors arising out of the insured’s gathering, recording, collecting, writing, editing, publishing, exhibiting, broadcasting, or releasing of content

Covers (DEEP = that ad really cut DEEP for me)

Defamation / Reputation Harm

Emotional Distress / Outrage Infliction

E&O Statements

Privacy Invasion

34
Q

Social Engineering

A

Can have coverage under crime policy, but better under cyber for events that relate to online social engineering

35
Q

Bricking or Computer Replacement Definition

A

Replaces computer systems that are rendered unusable after a cyber attack freezes them

36
Q

Cryptojacking Definition

A

Pays back utility costs associated with a hacker using the insured’s computers to crypto mine.

37
Q

Defense (What type) and Settlement (Similar to what coverage?)

A

Defense is right and duty to defend

Settlement similar to EPLI where you need consent to settle. They have hammer clauses and soft hammer clauses

38
Q

Cyber Exclusions (9)

A

PIMMP BAWB
- Payment Card Industry (exception for the Payment Card Industry coverage. Intended to not duplicate coverage)
- Interruption or Failure of Services (doesn’t pay for loss of electricity or utilities)
- Material Published with Knowledge of Falsity
- Music Licensing and Royalties (Only applies to Media Liability
- Prior Knowledge, Prior Notice, and Prior or Pending Litigation
- Bodily Injury and Property Damage
- Act of Nature
- War
- Breach of Contract and Assumed Liability

39
Q

Merger of Subsidiaries and Cessation of subsidiary 3

A

Merger
- Doesn’t continue coverage if covered insured’s business is not the surviving entity
- Need to have 50% ownership or 50% control over board

Cessation of Subsidiary
- Extended Reporting period or policy end coverage for subsidiaries that were removed

40
Q

Confidentiality Condition

A

Can’t tell Cyber criminal that you have insurance and what your limits are

41
Q

Other Insurance Condition

A

Cyber policy is always excess to other coverages unless another insurance is expressly written to be excess over this insurance.

42
Q

Representations and Severability of the Application

A
  • To be separate for each employee. Knowledge of one employee is not imputed to any other employee.
  • Coverage void if C-level signs a misrepresentation
43
Q

Extended Discovery Period (1st or 3rd party / How many days / how many days to report/ when not applicable)

A
  • 1st party
  • 60 days after policy ends and no coverage replaced
  • 60 days to report after discovered in the extended discovery period (can report a claim that happened on Day 60 on Day 120)
  • Not applicable if coverage cancelled or if you got a replacement policy
44
Q

Extended Reporting Period (1st or 3rd / How many days / how many days to report/ when not applicable)

A
  • 3rd party
  • 60 days after policy ends and no coverage replaced
  • 60 days to report after discovered in the extended discovery period (can report a claim that happened on Day 60 on Day 120)
  • Must occur prior to end of policy period and after retro date
45
Q

Run-Off Coverage Period

A

For a merger, consolidation or acquisition of the NI or cessation of a subsidiary

Applies to claims that are first made against an insured and reported during the Run-Off Coverage period in accordance with the reporting condition of the policy. The claims must also arise from wrongful acts occurring on or after the retroactive date, but prior to the merger, consolidation, or acquisition

46
Q

Business Income and Extra Expense (BI Definition 2 / EE Definition 2 / EE Exclusions (4))

A

Actual loss of net income
Continuing normal operating expesnes

Extra Expense
Above and beyond personal expenses
Extra costs for expediting Recovery

EE Doesn’t include expenses from the other 3 insuring agreements or repairing systems / data / programs