{"id":10948,"date":"2013-10-15T21:30:54","date_gmt":"2013-10-16T01:30:54","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-11-04T12:41:44","modified_gmt":"2021-11-04T16:41:44","slug":"need-cyber-insurance","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/need-cyber-insurance\/","title":{"rendered":"Need Cyber Insurance?"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20120713004522\/http:\/\/patentmath.com:80\/insurance-for-patent-infringement-and-false-marking-defense\/insurance_policy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106044\" title=\"Need Cyber Insurance?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance_policy.jpg?resize=110%2C110&#038;ssl=1\" alt=\"Need Cyber Insurance?\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance_policy.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance_policy.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/insurance_policy.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>Standard business insurance <strong>does not cover<\/strong> data breaches or almost any other <strong>loss involving data<\/strong>. Standard insurance covers tangible losses and damage. Data isn&#8217;t tangible <a title=\"Got cyber insurance? \" href=\"https:\/\/web.archive.org\/web\/20130513170742\/http:\/\/www.networkworld.com\/news\/2011\/102411-cyber-insurance-252145.html\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> <a title=\"Network World\" href=\"http:\/\/www.networkworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Network World<\/em><\/a>.\u00a0The ruling that <strong>data is not tangible<\/strong> goes back to a 2000 ruling by a <strong>U.S. District Court<\/strong>. The article explains the ruling arose from an Arizona case, <a title=\"American Guarantee &amp; Liability Insurance Co. vs. Ingram Micro Inc.\" href=\"http:\/\/www.internetlibrary.com\/cases\/lib_case155.cfm\" target=\"_blank\" rel=\"noopener noreferrer\">American Guarantee &amp; Liability Insurance Co. vs. Ingram Micro Inc.<\/a>. In that case, the court said that a computer outage caused by a power problem constituted physical damage within the meaning of the policy Ingram Micro had purchased from American Guarantee.<\/p>\n<p>&#8220;<a href=\"http:\/\/hardballtalk.nbcsports.com\/2012\/02\/24\/mlb-to-appeal-braun-ruling-to-federal-court-good-luck-with-that\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106046 size-thumbnail\" title=\"Courts ruled data is tangible property\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lawsuit-gavel.jpg?resize=75%2C56&#038;ssl=1\" alt=\"Courts ruled data is tangible property\" width=\"75\" height=\"56\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lawsuit-gavel.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lawsuit-gavel.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/lawsuit-gavel.jpg?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><em>After that, the insurance firms changed their policies to state that <strong>data is not considered <a title=\"Tangible property\" href=\"http:\/\/en.wikipedia.org\/wiki\/Tangible_property\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">tangible property<\/a><\/strong>,<\/em>&#8221; <a title=\"Kevin Kalinich\" href=\"https:\/\/web.archive.org\/web\/20140731170942\/http:\/\/one.aon.com:80\/kevin-kalinich\" target=\"_blank\" rel=\"noopener noreferrer\">Kevin Kalinich<\/a>, national managing director for network risk at\u00a0<a title=\"Aon Risk Solutions\" href=\"http:\/\/www.aon.com\/risk-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">Aon Risk Solutions<\/a> told <em>Network World.<\/em> The upshot is that an <strong>enterprise needs special cyber insurance<\/strong> to cover data-related issues. The problem is that the field is new and there is no such thing as standard coverage with a standard price.<\/p>\n<p><a title=\"Larry Ponemon\" href=\"http:\/\/www.linkedin.com\/pub\/larry-ponemon\/21\/909\/504\" target=\"_blank\" rel=\"noopener noreferrer\">Larry Ponemon<\/a>, chairman of the <a title=\"Ponemon Institute\" href=\"https:\/\/web.archive.org\/web\/20211006230055\/https:\/\/www.ponemon.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ponemon Institute<\/a>, told <em>Network World<\/em> that the resulting complexity is a major source of push-back by potential buyers. &#8220;The policies have limitations and constraints similar to home policies with <strong>act-of-God provisions<\/strong>, and that has created a lot of uncertainty about what is covered, and what the risks are.&#8221; Mr. Ponemon told the author, &#8220;Those who are nevertheless purchasing cyber insurance are typically very selective about what coverage they want.&#8221;<\/p>\n<p><em>Network World<\/em> describes the types of cyber coverage available.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20160210222158\/http:\/\/office-insurance.com\/policies.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106048\" title=\"cyber coverages available\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/binder.jpg?resize=100%2C54&#038;ssl=1\" alt=\"cyber coverages available\" width=\"100\" height=\"54\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/binder.jpg?resize=75%2C41&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/binder.jpg?resize=150%2C81&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/binder.jpg?w=250&amp;ssl=1 250w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Data breach coverage:<\/strong> This pays for expenses that result from a <a title=\"Data breach\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_breach\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">data breach<\/a>. Covered expenses typically include <strong>notification<\/strong> of the victims, setting up a call center, <strong>credit monitoring,<\/strong> and credit restoration services for the <strong>victims<\/strong>, and other crisis management services, <a title=\"Ken Goldstein, vice president at the Chubb Group\" href=\"http:\/\/www.linkedin.com\/pub\/ken-goldstein\/6\/a83\/407\" target=\"_blank\" rel=\"noopener noreferrer\">Ken Goldstein<\/a>, vice president at the <a title=\"Chubb Group\" href=\"http:\/\/www.chubb.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chubb Group<\/a>, told <em>Network World<\/em>. &#8220;You might want to hire forensic experts, independent attorneys for guidance concerning the multiple state (data breach notification) laws, and public relations experts.&#8221;<\/p>\n<p><strong>Regulatory civil action coverage:<\/strong> Pays in cases where the insured is facing fines from a <strong>state attorney general<\/strong> after a data breach, or from the federal government after a violation of the <a title=\"Health Insurance Portability and Accountability Act\" href=\"http:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Health Insurance Portability and Accountability Act<\/a> (<strong><a title=\"HIPAA\" href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA<\/a><\/strong>) or similar regulations. Some policies only cover the cost of defending against the action, while others may pay the fine as well, says Steven Haase, head of <a title=\"INSUREtrust\" href=\"https:\/\/web.archive.org\/web\/20240601073158\/https:\/\/insuretrust.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">INSUREtrust<\/a>, an Atlanta-based specialty insurance provider.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106052\" title=\"Cyber extortion coverage\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1-2.jpg?resize=100%2C83&#038;ssl=1\" alt=\"Cyber extortion coverage\" width=\"100\" height=\"83\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1-2.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1-2.jpg?resize=150%2C125&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach1-2.jpg?w=240&amp;ssl=1 240w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>Cyber extortion coverage:<\/strong> For cases where a hacker steals data from the policyholder and then tries to sell it back, or someone plants a <strong>logic bomb<\/strong> in the policy holder&#8217;s system and<strong> demands payment<\/strong> to disable it. Among other things, the policy should cover the cost of a negotiator, and the cost of offering a reward leading to the arrest of the perpetrator, Chubb&#8217;s Goldstein says.<\/p>\n<p><strong>Virus liability:<\/strong> Pays in cases where the policyholder is sued by someone who claims to have gotten a virus from the policy holder&#8217;s system.<\/p>\n<p><a href=\"https:\/\/www.chubb.com\/us-en\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106053 size-thumbnail\" title=\"Chubb logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chubb-logo-1.jpg?resize=75%2C63&#038;ssl=1\" alt=\"Chubb logo\" width=\"75\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chubb-logo-1.jpg?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chubb-logo-1.jpg?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/chubb-logo-1.jpg?w=200&amp;ssl=1 200w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><strong>Content liability:<\/strong> Covers lawsuits filed by people angered over <strong>something posted on the Web site<\/strong> of the policyholder. Such coverage should also cover copyright claims and domain name disputes, INSUREtrust&#8217;s Haase told <em>Network World<\/em>.<\/p>\n<p><strong>Lost income coverage:<\/strong> Replaces revenue lost while the policy holder&#8217;s <strong>computer system or Web site is down<\/strong>. But Aon&#8217;s Kalinich notes that insurers often apply <strong>minimum downtimes<\/strong> of 12 or 24 hours, or require proof of actual losses, &#8220;They&#8217;ll say that, after all, the customers who did not get through (during the outage) could have come back later.&#8221;<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20140824102153\/http:\/\/www.aon.com:80\/risk-services\/thought-leadership\/podcasts\/technology-practice\/default.jsp\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106055 size-thumbnail\" title=\"AON logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/aon_logo.gif?resize=75%2C40&#038;ssl=1\" alt=\"AON logo\" width=\"75\" height=\"40\" \/><\/a><strong>Loss of data coverage:<\/strong> Pays for the cost of replacing the policy holder&#8217;s data in case of loss, &#8220;<strong>Backup<\/strong> policies are not always effective, and accidents and sabotage happen,&#8221; Mr. Haase says.<\/p>\n<p><strong>Errors and omissions coverage:<\/strong> Otherwise known as O&amp;M policies, this type of coverage predates cyber insurance, but is increasingly added to cyber policies to <strong>cover alleged failures<\/strong> by the policy holder&#8217;s <strong>software<\/strong>, Haase says.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20130118042142\/http:\/\/health.unl.edu:80\/parents\/healthcheck\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106057 size-thumbnail\" title=\"Errors and omissions coverage\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/checklist-1.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Errors and omissions coverage\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/checklist-1.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/checklist-1.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/checklist-1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>As for what <strong>coverage costs<\/strong>, Aon&#8217;s Kalinich told <em>Network World<\/em> that firms smaller than $100 million in annual revenue can expect to pay $5,000 to $15,000 per million of coverage, while larger firms would pay $10,000 to $25,000. For those over a billion, the price can be in the $20,000 to $50,000 range. Robert Parisi, senior vice president with <a title=\"Marsh\" href=\"https:\/\/web.archive.org\/web\/20150416022408\/http:\/\/usa.marsh.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\">Marsh<\/a>, an insurance broker, and risk advisory firm put it simpler, saying the cost is between <strong>$7,000 and $35,000 per million<\/strong>. Of course, the lower ranges are for buyers who look like <strong>better risks<\/strong> \u2014 and deciding who is a better risk is another factor that makes cyber insurance a complex topic.<\/p>\n<p>&#8220;<em>You cannot get good insurance unless you have <strong>good security practices<\/strong>,<\/em>&#8221; VP Kalinich says. &#8220;<em>Due diligence underwriting has become more streamlined as the insurers have learned what to look for. They will typically <strong>benchmark you against other members of your industry<\/strong>.<\/em>&#8221;<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106060\" title=\"15% of the premium goes to commissions\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/handful_money.jpg?resize=67%2C100&#038;ssl=1\" alt=\"15% of the premium goes to commissions\" width=\"67\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/handful_money.jpg?resize=100%2C150&amp;ssl=1 100w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/handful_money.jpg?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/handful_money.jpg?w=267&amp;ssl=1 267w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/>INSUREtrust&#8217;s Haase explained the cyber insurance purchase process to the author, &#8220;<em>This is a complex purchase and you need a professional helping you.\u00a0Most policies are <strong>highly customizable<\/strong>, and there are a lot of endorsements.&#8221;<\/em> Typically the buyer goes to their local agent, and the local agent uses a specialist, Haase says. Both the local agent and the specialist get <strong>commissions ranging from 7.5% to 10%<\/strong>\u00a0so that 15% to 10% of the premium goes to commissions.<\/p>\n<p>Finally, <a title=\"Toby Merrill, VP ACE Professional Risk\" href=\"http:\/\/www.linkedin.com\/pub\/toby-merrill\/7\/2a0\/6b9\" target=\"_blank\" rel=\"noopener noreferrer\">Toby Merrill<\/a>, vice president of insurer <a title=\"ACE Professional Risk\" href=\"https:\/\/web.archive.org\/web\/20160703122701\/http:\/\/www.acegroup.com:80\/us-en\/businesses\/privacy-network-security.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Ace Professional Risk<\/a> cautions that cyber insurance buyers must understand that if they are outsourcing their data handling, they <strong>are not<\/strong> at the same time <strong>outsourcing their liability<\/strong> if there is a data breach. The onus of the various breach notification laws is on the organization that gathered the data, not on the organization that was storing it when it was exposed, he notes.<\/p>\n<p>&#8220;<em>Cyber insurance is not there to replace sound risk management,<\/em>&#8221; VP Merrill told <em>Network World<\/em>, &#8220;I<em>t is there to supplement it.<\/em>&#8221;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20150305042741\/http:\/\/blog.securestate.com:80\/dont-be-the-next-target\/\" target=\"_blank\" rel=\"noopener noreferrer\">Why Target&#8217;s 100-Million Dollar Cyber Liability Policy is Worthless<\/a> (securestate.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Standard business insurance does not cover most losses involving data these losses special cyber insurance policies to recoup losses<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[137],"tags":[3044,1795,32,1847,849,1282,604,1946],"class_list":["post-10948","post","type-post","status-publish","format-standard","hentry","category-data-protection","tag-3044","tag-breach","tag-business","tag-cyber","tag-data","tag-hipaa","tag-insurance","tag-protection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=10948"}],"version-history":[{"count":19,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10948\/revisions"}],"predecessor-version":[{"id":131466,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/10948\/revisions\/131466"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=10948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=10948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=10948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}