The Insurance Coverage Law Information Center

The following article is from National Underwriter’s latest online resource,
FC&S Legal: The Insurance Coverage Law Information Center.
The Insurance Coverage Law Information Center
HOW TO SECURE DATA BREACH COVERAGE
November 26, 2013 Roberta D. Anderson
Roberta D. Anderson, a partner in the Pittsburgh office of K&L Gates LLP, concentrates her practice in insurance coverage
litigation and counseling. She has represented policyholders in connection with a wide range of insurance issues and
disputes arising under almost every kind of insurance coverage, including general liability, commercial property and
business interruption, “cyber”-liability, directors and officers, errors and omissions (“E&O”), technology E&O, professional
liability, employment practices liability, political risk, environmental, fidelity, fiduciary, crime, terrorism, residual value,
nuclear, and other insurance coverages, and in broker liability disputes. She can be reached at roberta.anderson@klgates.
com.
***
“Security experts like to say that there are now only two types of companies left in the United States: those that have been
hacked and those that don’t know they’ve been hacked.”[1] Hardly difficult to believe given the daily reports of serious
data breaches and other types of cyber incidents – perhaps most recently the Adobe data breach that reportedly affected
at least 38 million users[2] and already has already precipitated a putative class action.[3]
Verizon’s recent 2013 Data Breach Investigations Report remarks that “[p]erhaps more so than any other year, the large
scale and diverse nature of data breaches and other network attacks took center stage.”[4] And as the number of
breaches and other cyber incidents increase, the costs are also increasing. In a very recent 2013 Cost of Cyber Crime
Study, published October 2013, the Ponemon Institute reported that the mean annualized cost of cyber crime per U.S.
organization “is $11.6 million per year, with a range from $1.3 million to $58 million each year per company” – this
represents a whopping 26% increase from last year.[5] For a single data breach, Ponemon reports that the average U.S.
organizational cost is $5,403,644 – with $565,020 spent on post-breach notification alone.[6] Importantly, the numbers do
not include “data breaches in excess of 100,000 [records] because they … would skew the results.”[7] Yet the incidents of
large-scale breaches are on the rise – as illustrated by the recent Adobe breach.
There is, however, a positive facet in the face of daunting facts: organizations facing a data breach (or other cyber
incident) may have valuable insurance coverage. The following five tips will help organizations to secure that coverage.
#1. Look to “Cyber”/Privacy Insurance
More and more organizations are purchasing so-called “cyber” insurance.[8] For those organizations that have purchased
“cyber” insurance, the data breach/privacy coverage aspect of cyber insurance has been driving the market and should
respond to cover organizations for their exposure relating to a spectrum of issues typically confronting organizations in
the wake of a data breach incident. Many policies, for example, provide defense and indemnity coverage for lawsuits
arising out of a data breach.
By way of example, the AIG Specialty Risk Protector® specimen policy[9] states that the insurer will “pay … all Loss” that
the “Insured is legally obligated to pay resulting from a Claim alleging … a Privacy Event.”[10] “Privacy Event” includes,
among other things, “any failure to protect Confidential Information (whether by ‘phishing,’ other social engineering
technique or otherwise) including, without limitation, that which results in an identity theft or other wrongful emulation
of the identity of an individual or corporation ….”[11] “Confidential Information” is defined to include, among other
things, “information from which an individual may be uniquely and reliably identified or contacted, including, without
limitation, an individual’s name, address, telephone number, social security number, account relationships, account
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
©2013. All Rights Reserved.
numbers, account balances, account histories and passwords” and information protected by Gramm-Leach Bliley and the
Health Insurance Portability and Accountability Act.[12]
In addition to providing defense and indemnity coverage in connection with lawsuits arising out of a data breach, many
“cyber” policies respond to regulatory investigations. By way of example, the AIG Specialty Risk Protector® specimen
policy defines a “Claim” that triggers coverage to include “a Regulatory Action,” which in turn is defined as “a request for
information, civil investigative demand or civil proceeding brought by or on behalf of a governmental agency….[13]
Importantly, “cyber” policies also typically provide coverage for costs and expenses associated with “crisis” or “event”
management in the wake of a data breach incident, including, for example, breach notification, credit monitoring and
counseling services, public relations efforts and forensics to determine cause and scope of a breach. By way of example,
the AIG Specialty Risk Protector® specimen policy covers “all Loss … that an Insured incurs solely as a result of an alleged
… Privacy Event”[14] and defines “Loss” to include the following “reasonable and necessary expenses”:
(1) to conduct an investigation (including a forensic investigation) to determine the cause of the Security Failure or Privacy
Event;
(2) for a public relations firm, crisis management firm or law firm agreed to by the Insurer to advise an Insured on minimizing the harm to such Insured, including, without limitation, maintaining and restoring public confidence in such Insured;
(3) to notify those whose Confidential Information is the subject of the Security Failure or Privacy Event and advise of any
available remedy in connection with the Security Failure or Privacy Event, including, without limitation, those expenses
and costs for printing, advertising and mailing of materials;
(4) for identity theft education and assistance and credit file or identity monitoring;
(5) for any other services approved by the Insurer at the Insurer’s sole and absolute discretion;
(6) to restore, recreate or recollect Electronic Data; or
(7) to determine whether Electronic Data can or cannot be restored, recollected or recreated.[15]
There are numerous specialty “cyber” products on the market, sold by over thirty insurers, that provide coverage for data
breaches and other types of “cyber” risks, including liability and exposure arising out of the transmission of malicious
code, denial of third-party access to the insured’s network, media liability (for claims for alleging, for example,
infringement of copyright and other intellectual property rights and misappropriation of ideas or media content),
first-party asset management coverage (covering, for example, damage to, loss or use of, or theft of the insured’s own
computer systems and data), network/supply chain interruption (covering business interruption and extra expense caused
by network security incidents) and cyber extortion.
#2. Think Through General Liability Coverage
While some companies carry specialty “cyber” insurance policies that are specifically designed to afford coverage for
cyber risk, most companies have various forms of “traditional” or “legacy” insurance policies that may cover cyber risks,
including Insurance Services Office, Inc. (“ISO”)[16] standard-form commercial general liability (“CGL”) policies. There
may be significant coverage under CGL policies, including for data breaches that result in the disclosure of personally
identifiable information (commonly termed “PII”) and other claims alleging violation of a right to privacy.
For example, there is significant potential coverage under the “Personal And Advertising Injury Liability” coverage section
(Coverage B) of the standard-form ISO CGL policy, which currently states that the insurer “will pay those sums that the
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
©2013. All Rights Reserved.
insured becomes legally obligated to pay as damages because of ‘personal and advertising injury.’”[17] “Personal and
advertising injury” is defined to include a list of specifically enumerated offenses, which include the “offense” of “[o]ral
or written publication, in any manner, of material that violates a person’s right of privacy.”[18] Coverage disputes
generally focus on whether there has been a “publication” that violates the claimant’s “right of privacy” – both terms are
left undefined in standard-form ISO policies and courts generally have construed the language favorably to insureds and
have found coverage for a wide variety of claims alleging breach of privacy laws and regulations.[19]
There may also be coverage under the “Bodily Injury And Property Damage” section of the standard CGL form
(Coverage A), which states that the insurer “will pay those sums that the insured becomes legally obligated to pay as
damages because of ‘bodily injury’” that “occurs during the policy period.”[20] Although there is little, if any, case law to
date addressing whether claims arising from data breaches allege “bodily injury,” this potential source of coverage should
not be ignored, as case law and/or the specific policy language may support an argument that “bodily injury” includes
emotional harm resulting from, for example, concerns over identity theft.
#3. Consider Other Insurance, Including D&O, E&O & Crime Policies
It is important not to overlook other types of “traditional” or “legacy” insurance policies that may respond to cyber risks.
For example, there may be coverage under directors’ and officers’ (“D&O”) policies if, for example, a data security breach
impacts upon a company’s stock price and thereby precipitates shareholder litigation. Coverage also may be available
under professional liability or errors and omissions (“E&O”) policies, which generally cover “wrongful acts” committed in
the insured’s performance of “professional services” as defined in the policy. In addition, many companies have various
types of crime coverage, including fidelity insurance, which may cover cyber risks and losses. Such policies often expressly
include computer fraud, such as the transfer of money or securities to an outside location. Addressing the question of
coverage under a crime policy, the Sixth Circuit recently confirmed that an insured retailer was covered under the
computer fraud rider of its blanket crime policy for more than $6.8 million in stipulated losses associated with a data
breach that compromised customer credit card and checking account information.[21]
In the event of a data breach, companies are advised to provide prompt notice under all potentially implicated policies,
excepting in particular circumstances that may justify refraining to do so.
#4. Don’t Take “No” For An Answer
Unfortunately, even where there is a good claim for coverage under the policy language and applicable law, insurers can
be expected to argue that data breaches and other “cyber” risks are not covered under CGL or other “traditional” or
“legacy” insurance policies. Nevertheless, insureds that refuse to take “no” for an answer may be able to secure
coverage if they effectively pursue their claim for coverage.
Some recent decisions underscore this reality, including a very recent data breach decision, in which a California federal
court upheld coverage under a CGL policy for a hospital data breach that compromised the confidential medical
records of nearly 20,000 patients. In that case, Hartford Casualty Insurance Company v. Corcino & Associates et al.,[22]
the plaintiffs in two underlying class action lawsuits sought, among other relief, statutory damages of $1000 per person
under the California Confidentiality of Medical Information Act and statutory damages of up to $10,000 per person under
the California Lanterman Petris Short Act. Notwithstanding an express exclusion for “Personal And Advertising Injury ….
[a]rising out of the violation of a person’s right to privacy created by any state or federal act,”[23] the court upheld coverage, including for the statutory damages, noting that “medical records have been considered private and confidential
for well over 100 years at common law”[24] and finding that “[t]he statutes … permit an injured individual to recover
damages for breach of an established privacy right, and as such, fall squarely within the Policy’s coverage.”[25]
The Corcino decision underscores that, notwithstanding a growing prevalence of exclusions purporting to limit
coverage for data breach and other privacy related claims, there may yet be valuable privacy and data breach coverage
under “traditional” or “legacy” policies that should not be overlooked.
#5. Be Proactive
The time to think about potential data breach coverage – and coverage for myriad other “cyber” risks – is before a hack,
a breach, or other cyber incident is discovered. In thinking about potential coverage, it is important to note that, in
response to decisions upholding coverage for data breach, privacy, network security and other “cyber” risks, the
insurance industry has added various limitations and exclusions purporting to cut off the “traditional” or “legacy” lines
of coverage.[26]
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
©2013. All Rights Reserved.
Most recently, ISO filed a number of data breach exclusionary endorsements for use with its standard-form primary, excess
and umbrella CGL policies. These are to become effective in May 2014.
By way of example, one of the endorsements, entitled “Exclusion - Access Or Disclosure Of Confidential Or Personal
Information” adds the following exclusion to Coverage B:
This insurance does not apply to:
Access Or Disclosure Of Confidential Or Personal Information
“Personal and advertising injury” arising out of any access to or disclosure of any person’s or organization’s confidential
or personal information, including patents, trade secrets, processing methods, customer lists, financial information, credit
card information, health information or any other type of non public information.
This exclusion applies even if damages are claimed for notification costs, credit monitoring expenses, forensic expenses,
public relations expenses or any other loss, cost or expense incurred by you or others arising out of any access to or disclosure of any person’s or organization’s confidential or personal information.[27]
There are similar exclusions applicable to Coverage A. Although the full reach of the new exclusions ultimately will be
determined by judicial review, and it may take some time for the new (or similar) exclusions to make their way into CGL
policies, the exclusions provide another reason for companies to carefully consider specialty “cyber” insurance products.
And, as noted, even where insurance policies do not contain the newer limitations or exclusions, insurers may argue that
cyber risks are not covered under traditional policies.
Organizations are advised to take a proactive approach and review “traditional” or “legacy” policies, including CGL,
D&O, E&O, crime and commercial property policies, to identify what coverage the organization may currently have for
data breach liability and other “cyber” risks. Once an organization understands its current insurance program, it will be
well positioned to approach the “cyber” insurance market to fill potential gaps in coverage.
It is important, however, that organizations embrace a team approach when purchasing “cyber” insurance. Because of
the nature of the product and the risks that it is intended to cover, successful placement requires the involvement and
input, not only of a capable risk management department and a knowledgeable insurance broker, but also of in-house
legal counsel and IT professionals, resources, treasury and compliance personnel – and experienced insurance coverage
counsel.
Cyber insurance coverages can be extremely valuable, but the terms and conditions must be analyzed carefully to ensure
that the coverage provided meets the organization’s potential exposures and to ensure that important facets of coverage
are not vitiated.
[1]Nicole Perlroth, The Year in Hacking, by the Numbers, BITS blog, The New York Times (Apr. 22, 2013), available at
http://bits.blogs.nytimes.com/2013/04/22/the-year-in-hacking-by-the-numbers/.
[2]Gareth Halfacree, Adobe data breach far worse than first claimed (Nov. 5, 2013), available at http://www.bit-tech.net/
news/bits/2013/11/05/adobe-breach-2/1.
[3] See Halpain et al. v. Adobe Systems, Inc., No. 5:13-cv-05226 (N.D.C. filed Nov. 11, 2013).
[4] Verizon, 2013 Data Breach Investigations Report, at 1 (2013).
[5] Ponemon Institute, 2013 Cost of Cyber Crime Study: United States, at 5 (Oct. 2013).
[6] Ponemon Institute, 2013 Cost of Data Breach Study: Global Analysis, at 5, 16 (May 2013).
[7] Id. at 1.
[8] See Marsh, Benchmarking Trends: More Companies Purchasing Cyber Insurance (Mar. 14, 2013).
[9] See AIG Specialty Risk Protector® Specimen Policy Form 101014 (11/09), Security and Privacy Coverage Section.
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
©2013. All Rights Reserved.
[10] Id. Section 1.
[11] Id. Section 2.(j)(1).
[12] Id. Section 2.(d).
[13]Id. Section 2.(b, l).
[14] Id., Event Management Coverage Section, Section 1.
[15] Id. Section 2.(h).
[16]ISO is an insurance industry organization whose role is to develop standard insurance policy forms and to have those
forms approved by state insurance commissioners.
[17] ISO Form CG 00 01 04 13 (2012), Section I, Coverage B, §1.a.
[18] Id. §14.e.
[19]
See, e.g., Netscape Commc’ns Corp. v. Federal Ins. Co., 343 Fed.Appx. 271 (9th Cir. 2009), aff’g 2007 WL 1288192
(N.D. Cal. Apr. 27, 2007) (upholding coverage for claims alleging that the insured’s “SmartDownload” software
violated the Electronic Communications Privacy Act and the Computer Fraud and Abuse Act by, among other things,
“collecting, storing, and disclosing … claimants’ Internet usage,” which was “used … to create opportunities for
targeted advertising”).
[20] ISO Form CG 00 01 04 13 (2012), Section I, Coverage A, §§1.a., 1.b.(2).
[21]
Retail Ventures, Inc. v. National Union Fire Ins. Co. of Pittsburgh, Pa., 691 F.3d 821 (6th Cir. 2012) (predicting Ohio
law).
[22]No. CV 13-3728 GAF (JCx), Minutes (In Chambers) Order Re: Motion To Dismiss (Oct. 7, 2013); see also Roberta D.
Anderson, Recent California Decision Holds That Privacy / Data Breach Liability Covered Under “Traditional”
Insurance Policy, K&L Gates LLP Insurance Coverage Alert (Oct. 18, 2013), available at http://www.klgates.com/
recent-california-decision-holds-that-privacy--data-breach-liability-covered-under-traditional-insurance-policy10-18-2013/.
[23] Hartford’s First Amended Complaint For Declaratory Relief, filed on June 18, 2012, at ¶ 20.
[24] Corcino, No. CV 13-3728 GAF (JCx), at 6-7.
[25] Id. at 7.
[26]
See Roberta D. Anderson, ISO’s Newly-Filed Data Breach Exclusions Provide Yet Another Reason To Consider “
Cyber” Insurance, Law360 (Sept. 23, 2013), available at http://www.law360.com/articles/473886/yet-another-reasonto-consider-cyber-insurance.
[27] CG 21 08 05 14 (2013).
ABOUT THE AUTHOR
Roberta D. Anderson is a partner in the Pittsburgh office of K&L Gates LLP, a law firm that regularly represents policyholders in insurance coverage disputes. The opinions expressed in this article are those of the author, and should not be construed as necessarily reflecting the views of her law firm, or the firm’s clients, or as an endorsement by the law firm or the
law firm’s clients of any legal position described herein. Ms. Anderson can be reached at Roberta.Anderson@klgates.com
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
©2013. All Rights Reserved.
For more information, or to begin your free trial:
• Call: 1-800-543-0874
• Email: customerservice@SummitProNets.com
• Online: www.fcandslegal.com
FC&S Legal guarantees you instant access to the most authoritative and comprehensive
insurance coverage law information available today.
This powerful, up-to-the-minute online resource enables you to stay apprised
of the latest developments through your desktop, laptop, tablet, or smart phone
—whenever and wherever you need it.
Call 1-800-543-0874 | Email customerservice@SummitProNets.com | www.fcandslegal.com
©2013. All Rights Reserved.