{"id":10830,"date":"2012-06-14T21:24:02","date_gmt":"2012-06-15T01:24:02","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=10830"},"modified":"2022-11-11T11:41:04","modified_gmt":"2022-11-11T16:41:04","slug":"got-cyber-insurance","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/got-cyber-insurance\/","title":{"rendered":"Got Cyber Insurance?"},"content":{"rendered":"<p><em><a href=\"http:\/\/data-mining.philippe-fournier-viger.com\/answer-reviewers-journal-paper-revision\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-109432\" title=\"Got Cyber Insurance?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Insurance-1.jpg?resize=100%2C88&#038;ssl=1\" alt=\"Got Cyber Insurance?\" width=\"100\" height=\"88\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Insurance-1.jpg?resize=150%2C132&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Insurance-1.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Insurance-1.jpg?w=450&amp;ssl=1 450w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a><a title=\"www.networkworld.com\" href=\"http:\/\/web.archive.org\/web\/20140831072716\/http:\/\/www.networkworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Network World<\/a><\/em> <a title=\"www.networkworld.com\" href=\"http:\/\/web.archive.org\/web\/20131610384600\/http:\/\/www.networkworld.com\/news\/2011\/102411-cyber-insurance-252145.html\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> that <strong>standard business insurance does not cover<\/strong> data breaches or almost any other <strong>loss involving data<\/strong>. Standard insurance covers tangible losses and damage. <strong>Data isn&#8217;t tangible<\/strong>. This is causing many firms to investigate cyber insurance.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109436\" title=\"data is not tangible\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?resize=100%2C69&#038;ssl=1\" alt=\"data is not tangible\" width=\"100\" height=\"69\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?resize=150%2C103&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?resize=75%2C52&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?resize=768%2C528&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?resize=1024%2C704&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?w=1512&amp;ssl=1 1512w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/legal_system-1.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>The decision that data is not tangible goes back to a <strong>2000 ruling by a U.S. District Court<\/strong>. The ruling arose from an Arizona case, <a title=\"Insurance Coverage for Cyberattacks\" href=\"https:\/\/www.lexisnexis.com\/community\/insurancelaw\/blogs\/insurancelawblog\/archive\/2009\/07\/13\/insurance-coverage-for-cyberattacks.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">American Guarantee &amp; Liability Insurance Co. vs. Ingram Micro Inc.<\/a>. In that case, the court said that a computer outage caused by a power problem constituted physical damage within the meaning of the policy <a title=\"Ingram Micro\" href=\"https:\/\/www.ingrammicro.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ingram Micro<\/a> (<a title=\"NYSE : IM\" href=\"https:\/\/www.prnewswire.com\/news-releases\/platinum-equity-to-acquire-ingram-micro-for-7-2-billion-301189450.html\" target=\"_blank\" rel=\"nofollow noopener\">IM<\/a>) had purchased from American Guarantee.<\/p>\n<p>&#8220;<em>After that, the insurance firms changed their policies to state that data is not considered <a title=\"Tangible property\" href=\"http:\/\/en.wikipedia.org\/wiki\/Tangible_property\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">tangible property<\/a>,<\/em>&#8221; Kevin Kalinich, national managing director for network risk at insurance vendor <a title=\"www.aon.com\" href=\"https:\/\/web.archive.org\/web\/20180527015646\/http:\/\/www.aon.com:80\/risk-services\/enterprise-risk-mgmt.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Aon Risk Solutions<\/a> told <em>Network World.<\/em> The upshot is that an <strong>enterprise needs special cyber insurance to cover data-related issues.<\/strong> The problem is that the field is new and there is no such thing as standard coverage with a standard price.<\/p>\n<h3>Buyers push back<\/h3>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109440\" title=\"major source of push-back by potential buyers\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man-pushing-1.png?resize=110%2C91&#038;ssl=1\" alt=\"major source of push-back by potential buyers\" width=\"110\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man-pushing-1.png?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man-pushing-1.png?resize=75%2C62&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man-pushing-1.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/>The resulting complexity is a major source of push-back by potential buyers. According to Larry Ponemon, chairman of the <a title=\"Ponemon Institute\" href=\"https:\/\/web.archive.org\/web\/20211006230055\/https:\/\/www.ponemon.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Ponemon Institute<\/a>, a research organization focused on information security and protection, &#8220;<em>The policies have limitations and constraints similar to home policies with act-of-God provisions, and that has created a lot of uncertainty about what is covered, and what the risks are,<\/em>&#8221; Mr. Ponemon told <em>Network World<\/em>. &#8220;T<em>hose who are nevertheless purchasing cyber insurance are typically very selective about what coverage they want,<\/em>&#8221; he adds.<\/p>\n<h3>Cyber insurance coverages available<\/h3>\n<p><strong><a href=\"https:\/\/www.ethicalpsychology.com\/2012\/01\/small-medical-practices-greatly-at-risk.html?m=1\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109442\" title=\"Data breach coverage\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-10-e1571349869607-150x112.jpg?resize=134%2C100&#038;ssl=1\" alt=\"Data breach coverage\" width=\"134\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-10-e1571349869607.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-10-e1571349869607.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft1-10-e1571349869607.jpg?w=224&amp;ssl=1 224w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/a>Data breach coverage:<\/strong> This pays for expenses that result from a <a title=\"Data breach\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_breach\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">data breach<\/a>. Covered expenses typically include notification of the victims, setting up a call center. They also cover credit monitoring, and credit restoration services for the victims, and other crisis management services. Ken Goldstein, vice president at insurer <a title=\"Chubb Group\" href=\"https:\/\/www.chubb.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chubb Group<\/a> told <em>Network World<\/em>. &#8220;Y<em>ou might want to hire forensic experts, independent attorneys for guidance concerning the multiple state (data breach notification) laws, and public relations experts,<\/em>&#8221; he says.<\/p>\n<p><strong>Regulatory civil action coverage:<\/strong> Pays in cases where the insured is facing fines from a state attorney general after a data breach. It also covers fines from the federal government after a violation of the Health Insurance Portability and Accountability Act (<a title=\"HIPAA\" href=\"https:\/\/web.archive.org\/web\/20151206124546\/http:\/\/www.hhs.gov:80\/ocr\/privacy\/hipaa\/understanding\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA<\/a>) or similar regulations. Some policies only cover the cost of defending against the action. While others may pay the fine as well, says Steven Haase, head of <a title=\"INSUREtrust\" href=\"https:\/\/web.archive.org\/web\/20240601073158\/https:\/\/insuretrust.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">INSUREtrust<\/a>, an Atlanta-based specialty insurance provider.<\/p>\n<p><strong><a href=\"http:\/\/diversifiedinsurance.blogspot.com\/2011\/02\/running-business-without-cyber.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109446\" title=\"Cyber extortion coverage\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach1-1.jpg?resize=110%2C92&#038;ssl=1\" alt=\"Cyber extortion coverage\" width=\"110\" height=\"92\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach1-1.jpg?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach1-1.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach1-1.jpg?w=240&amp;ssl=1 240w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Cyber extortion coverage:<\/strong> For cases where a hacker steals data from the policyholder and then tries to sell it back, or someone plants a logic bomb in the policy holder&#8217;s system and demands payment to disable it. Among other things, the policy should cover the cost of a negotiator, and the cost of offering a reward leading to the arrest of the perpetrator, Goldstein says.<\/p>\n<p><strong>Virus liability:<\/strong> Pays in cases where the policyholder is sued by someone who claims to have gotten a virus from the policy holder&#8217;s system.<\/p>\n<p><strong>Content liability:<\/strong> Covers lawsuits filed by people angered over something posted on the Web site of the policyholder. Such coverage should also cover copyright claims and domain name disputes, Haase says.<\/p>\n<h3>Loss coverages<\/h3>\n<p><strong>Lost income coverage:<\/strong> Replaces revenue lost while the policy holder&#8217;s computer system or Web site is down. But Kalinich notes that insurers often apply minimum downtimes of 12 or 24 hours, or require proof of actual losses. &#8220;They&#8217;ll say that, after all, the customers who did not get through (during the outage) could have come back later,&#8221; he says.<\/p>\n<p><strong><a href=\"http:\/\/people.duke.edu\/~tkb13\/courses\/ncsu-csc405-2015fa\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-109449\" title=\"Loss of data coverage\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-6.jpg?resize=110%2C90&#038;ssl=1\" alt=\"Loss of data coverage\" width=\"110\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-6.jpg?resize=150%2C122&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-6.jpg?resize=75%2C61&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_theft2-6.jpg?w=550&amp;ssl=1 550w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Loss of data coverage:<\/strong> Pays for the cost of replacing the policy holder&#8217;s data in case of loss. &#8220;Backup policies are not always effective, and accidents and sabotage happen,&#8221; Haase says.<\/p>\n<p><strong>Errors and omissions coverage:<\/strong> Otherwise known as O&amp;M policies, this type of coverage predates cyber insurance, but is increasingly added to cyber policies to cover alleged failures by the policy holder&#8217;s software, Haase says.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Seems that interest is growing in cyber insurance. I wrote about cyber insurance <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-wK\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/corporateinsuranceblog.com\/2011\/10\/28\/would-your-companys-insurance-cover-a-cyberattack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Would your company&#8217;s insurance cover a cyberattack?<\/a> (corporateinsuranceblog.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20120420152740\/http:\/\/www.theglobeandmail.com:80\/news\/technology\/business-technology\/hacking-blitz-drives-cyberinsurance-demand\/article2060510\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hacking blitz drives cyberinsurance demand<\/a> (theglobeandmail.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enterprises need special cyber insurance to cover data-related issues since a US court ruled that data isn&#8217;t tangible and not covered by standard insurance<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[2197,32,125,1282,604,279,1281],"class_list":["post-10830","post","type-post","status-publish","format-standard","hentry","category-business","tag-2197","tag-business","tag-data-breach","tag-hipaa","tag-insurance","tag-lawsuit","tag-ponemon-institute"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10830"}],"version-history":[{"count":16,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10830\/revisions"}],"predecessor-version":[{"id":131465,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10830\/revisions\/131465"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}