Bookmark and Share Email this page Email Print this page Print Pin It
Feed Feed

Mar 23, 201501:06 PMLegal Login

with Mindi Giftos

Why you need cyber insurance

(page 1 of 2)

The adage used to be “nothing is certain in life but death and taxes,” but thanks to the efforts of innovative hackers across the globe, that can now be changed to “death, taxes, and security breaches.” To paraphrase Federal Trade Commissioner Julie Brill, there are two types of companies out there, those that know they’ve been hacked and those that haven’t yet learned about it.

Massive data security breaches have already grabbed headlines multiple times in 2015, and most companies are paying attention. In a previous post, I discussed seven things corporate management needs to know about data privacy and security. I’d like to add one more item to that list: cyber insurance.

In past years, very few insurance companies wrote cyber insurance policies. However, since high-profile security breaches began taking over weekly headlines, companies now have several policy options available to them. They are also highly customizable based on each company’s particular needs. For example, not all companies use cloud-hosting services or store highly sensitive, personally identifiable information. However, all companies do store valuable data. A breach could present significant liability or risk.

Headlines often highlight credit card numbers, but so much more is at stake, such as Social Security numbers, intellectual property, and small pieces of information that all could be used to build a profile. There really is no limit to what information could be used and exploited. The bottom line: Every company needs to take steps to reduce its risk, and obtaining cyber insurance is one of those steps.

Following are several types of coverage areas worth considering:

  1. Coverage against third-party claims. This provides protection from liability when you have others’ information in your possession and it gets compromised. Sometimes this extends to your hosts if your information is in the cloud, but sometimes it does not.
  2. Breach remediation and notification costs. This often includes credit monitoring costs, identity fraud insurance policies, and forensic audit costs.
  3. Computer program and data recovery. Usually this is your own coverage and may not cover your clients if you have their information. This can be very expensive, and other options include investing in secure backup systems. Depending on the nature of your business, this can be critical, but it’s often costly.
  4. Business interruption coverage. This is key for companies that outsource primary business functions. Business interruption damages are often classified as consequential, which is not often the reality in a security breach situation.
  5. Extortion coverage. This is an area many companies never thought about until the Sony Pictures data breach. Even Sony wasn’t a true extortion case, but it had the overtones for it. This is a must if you have particularly valuable information on your systems.
  6. Defense coverages. This can apply to third-party claims, and there are also options for regulatory claims. It can be very costly, but it’s important to consider, particularly as the Federal Trade Commission has shown great interest in investigating security breaches to determine whether companies are adequately protecting consumers.
  7. Communications and media coverage. It is well known that a security breach can leave its most measured mark on a brand. If you are a higher profile company, this could be critical.

(Continued)

Add your comment:
Bookmark and Share Email this page Email Print this page Print Pin It
Feed Feed

About This Blog

Mindi Giftos and her colleagues in Husch Blackwell’s Technology Law group handle a wide variety of issues related to emerging and established technologies, including intellectual property, development and licensing, commercial contracting, and corporate transactions across a broad range of industries.

Recent Posts

Archives

Feed

Atom Feed Subscribe to the Legal Login Feed »

Edit Module