What Your Company Needs to Know about Cybersecurity June 6, 2013

advertisement
What Your Company Needs to
Know about Cybersecurity
June 6, 2013
© Copyright 2013 by K&L Gates LLP. All rights reserved.
Introductions
Roberta D. Anderson
Insurance Coverage
Partner
David A. Bateman
Internet & Technology
Law Partner
klgates.com
Bruce J. Heiman
Information Technology
Policy Partner
I. Managing Attacks on Company Information,
Technology, Data and Infrastructure
klgates.com
klgates.com
The Spectrum of Cyber Attacks
Advanced Persistent Threats (“APT”)
Data Breach and Malware
Denial of Service attacks (“DDoS”)
Domain name hijacking
Corporate impersonation and Phishing
Employee mobility and disgruntled
employees
Lost or stolen laptops and mobile
devices
Inadequate security and systems: first
party and third-party vendors
klgates.com
Advanced Persistent Threats
targeted, persistent, evasive and advanced
nation state sponsored
P.L.A. Unit 61398
“Comment Crew”
klgates.com
Advanced Persistent Threats
United States Cyber Command and director of the
National Security Agency, Gen. Keith B. Alexander,
has said the attacks have resulted in the “greatest
transfer of wealth in history.”
Source: New York Times, June 1, 2013.
klgates.com
Advanced Persistent Threats
Penetration: Spear Phishing
67 percent of organizations admit that their current
security activities are insufficient to stop a targeted
attack.*
Duration:
average = 356 days**
Discovery: External Alerts
55 percent are not even aware of intrusions*
*Source: Trend Micro, USA.
http://www.trendmicro.com/us/enterprise/challeng
es/advance-targeted-attacks/index.html
**Source: Mandiant, “APT1, Exposing One of
China’s Cyber Espionage Units”
klgates.com
Advanced Persistent Threats
Target Profiles
Industry:
Information Technology
Aerospace
Telecom/Satellite
Energy
Engineering/Research/Defense
Chemical/Pharma
Activities:
Announcements of China deals
China presence
klgates.com
The Spectrum of Cyber Attacks
Advanced Persistent Threats (“APT”)
Data Breach and Malware
Denial of Service attacks (“DDoS”)
Domain name hijacking
Corporate impersonation and Phishing
Employee mobility and disgruntled
employees
Lost or stolen laptops and mobile
devices
Inadequate security and systems: first
party and third-party vendors
klgates.com
The Practical Risks of Cyber Attacks
Loss of “crown jewels,” IP and trade secrets
Compromise of customer information, credit cards
and other PII
Loss of web presence and online business
Interception of email and data communications
Loss of customer funds and reimbursement of
charges
Supply chain disruption and outright theft
Brand tarnishment
Collateral damage
Legal and regulatory complications
klgates.com
II. Understanding Legal and Regulatory Risk
klgates.com
II. LEGAL & REGULATORY RISKS
Bad News
No system of prevention is perfect.
There will be a data breach.
Good News
The Law doesn’t require perfection!
Reasonable prevention measures
Compliance with specified procedures to mitigate harm
STRONGEST
BEST
klgates.com
III. Government Regulations and Legislation
klgates.com
III. APPLICABLE LEGISLATION & REGULATION
We will cover
FTC Act
States’ data breach laws
GLBA
HIPAA
NIST standards
Possible CI standards
klgates.com
Federal: FTC Enforcement & General Standard
for Protecting Personal Information
Enforcement of company commitments
Reasonable Administrative, Technical, Physical
Safeguards appropriate for the …
• Size and complexity of company
• Nature and scope of activities
• Sensitivity of personal information
klgates.com
What is Personally Identifiable Information
Needing Protection?
Name
Address
DOB
Email
Telephone number
SSN
Bank account, credit card numbers
Processor serial number
klgates.com
What Are Reasonable Measures?
FTC has focused on process in numerous consent
decrees
Designate responsible employee
Identify reasonable foreseeable risks
• Employee training
• Information systems
• Prevention, detection, response
Safeguards -- design & implement, test & monitor
Selection & retention of service providers
Evaluate and adjust
Independent assessments
klgates.com
Additional Guidance from HIPAA
Administrative
• Security management
• Security personnel
Physical
• Facility access &
control
• Workstation/Device
Security
Technical
• Access
• Audit
• Rule based access to info
• Integrity
• Workforce training
• Transmission
• Evaluation
klgates.com
States: General Standard for
Preventing Data Breaches
Data breach statutes focus on responding to breaches
impacting residents of that state
But almost all include security requirements
Mostly some version of reasonable security measures
klgates.com
States: General Standard for
Responding to Data Breaches
What is a breach
Duty to investigate
What constitutes a reportable breach
When do you have to report
Who to notify
How to notify
What does the notice have to say
klgates.com
Federal Requirements of a Breach
GLBA and HIPAA have similar requirements to states
• But recent HIPAA amendments adopt more stringent
requirements than GLBA on …
• What is a breach
• Reportable breach
• When mass notice required
Also, must consider possible violations of the
export control and arms control laws
klgates.com
Selling to the Government …
Compliance with NIST Standards
Federal agencies must meet security standards
De facto requirements for contractors
Sets baseline security controls
Requires adjustment and supplementing based on risk assessment
Just completed 4th revision adopts holistic view, increases focus on privacy,
and addresses new issues
• mobile and cloud computing
• insider threats
• applications security
• supply chain risks
• advanced persistent threat
• trustworthiness, assurance, and resilience of information systems
klgates.com
Possible Standards for Owners/Operators
of “Critical Infrastructure”
February Executive Order 13636
• CI: Incapacity or destruction would have debilitating impact
o Not commercial IT products or consumer IT services
• NIST Lead “Cybersecurity Framework”
• Incorporate voluntary consensus standards and
industry best practices
o International
o No tech mandates
Legislative proposals
• Arguably define CI more broadly
• Adopt greater regulatory approach
o Government (FTC/DHS) sets standards
• Mandates > incentives
klgates.com
IV. Litigation Risks and Case Developments
klgates.com
IV. Litigation Risks and Case Developments
Class Action exposure – Data Breach and Privacy Claims
In Re LinkedIn User Privacy Litigation (N.D. Cal. 2013)(“abstract” harm leads to
dismissal)
Krottner v. Starbucks Corp., 628 F.3d 1139 (9th Cir. 2010)("credible threat of real
and immediate harm”)
Grigsby v. Valve Corp. (W.D. Wash. 2013)(promises of security overvalued
services)
Class Action exposure – securities litigation
In re Heartland Payment Systems, Inc. (D. N. J. 2009)(80% stock drop leads to
derivative suit)
Agency Enforcement
FTC v. Wyndham Hotels (D. Ariz. 2012)(2 year Russian hacking)
FTC v. RockYou, Inc. (N.D.Cal. 2012)(hackers access PII of 32 million users)
Mass. v. South Shore Hospital (AG enforcement; $750k settlement)
Indiana v. Wellpoint, Inc. (AG enforcement; $100k settlement)
klgates.com
V. SEC Disclosure of Cybersecurity Risks
klgates.com
V. SEC Disclosure of Cybersecurity Risks
SEC Division of Corporation Finance issued guidance on
cybersecurity disclosures.
The guidance in essence states that appropriate
disclosures may include four things
material cybersecurity risks—both internal risks and risks
from outsourced functions
cyber incidents, which individually or in the aggregate pose
material risk or cost
risks of material cyber incidents that may remain undetected
for an extended period
a “[d]escription of relevant insurance coverage” for cyber
risks
klgates.com
VI. Insurance Coverage for Cyber Risks
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage under “traditional” third-party CGL
policies
Potential coverage for claims alleging damage to, or loss of
use of, third-party data, computers or computer systems
(“Coverage A”)
Potential coverage for data breach and other claims alleging
violation of a right to privacy (“Coverage A” and (“Coverage B”)
Potential coverage for misappropriation and infringement
claims
klgates.com
V. Insurance Coverage For Cyber Risks
Coverage A
SECTION I – COVERAGES
COVERAGE A – BODILY INJURY AND PROPERTY
DAMAGE LIABILITY
1. Insuring Agreement
1111
a. We will pay those sums that the insured
iiiiiiiiiiiiiiii1becomes legally obligated to pay as damages
iiiiiiiiiiiiiiii1because
of "bodily injury" or "property
iiiiiiiiiiiiiiii1damage” to which this insurance applies.
*****
15. "Property damage" means:
a. Physical injury to tangible property,
including all resulting loss of use of that
property. All such loss of use shall be deemed
to occur at the time of the physical Iinjury that
caused it; or
b. Loss of use of tangible property that is not
physically injured. All such loss of use shall
be deemed to occur at the time of the
"occurrence“ that caused it.
klgates.com
V. Insurance Coverage For Cyber Risks
ISSUE: Is data is “tangible property” that can suffer “physical
injury”?
Some courts have found coverage
Retail Systems, Inc. v. CNA Ins. Co. 469 N.W.2d 735, 737 (Minn.
Ct. App. 1991) (“data on the tape was of permanent value and was
integrated completely with the physical property of the tape … the
computer tape and data are tangible property”)
Computer Corner, Inc. v. Fireman's Fund Ins. Co., No. CV97-10380,
slip op. at 3-4 (2d Dist. Ct. N.M. May 24, 2000) (“computer data is
tangible property”)
klgates.com
V. Insurance Coverage For Cyber Risks
ISSUE: Is data is “tangible property” that can suffer “physical
injury”?
Some courts have rejected coverage
America Online Inc. v. St. Paul Mercury Ins. Co., 207 F. Supp. 2d
459, 467, 468-69 (E.D. Va. 2002) (“the Policy does not cover
damage to computer data, software and systems because such
items are not tangible property”)
State Auto Prop. & Cas. Ins. Co. v. Midwest Computers & More, 147
F.Supp.2d 1113, 1116 (W.D. Okla. 2001) (“Alone, computer data
cannot be touched, held, or sensed by the human mind; it has no
physical substance. It is not tangible property.”)
klgates.com
V. Insurance Coverage For Cyber Risks
Potential additional hurdles to coverage
“Property damage” definition (ISO 2001 and later forms)
“Electronic Data” exclusion (ISO 2004 and later forms)
klgates.com
V. Insurance Coverage For Cyber Risks
“Property damage” definition
17. "Property damage" means:
a. Physical injury to tangible property, including all
resulting loss of use of that property. All such
loss of use shall be deemed to occur at the time
of the physical injury that caused it; or
b. Loss of use of tangible property that is not
physically injured. All such loss of use shall be
deemed to occur at the time of the "occurrence"
that caused it.
For the purposes of this insurance, electronic data is
not tangible property.
As used in this definition, electronic data means
information, facts or programs stored as or on, created
or used on, or transmitted to or from computer
software, including systems and applications software,
hard or floppy disks, CDROMs, tapes, drives, cells,
data processing devices or any other media which are
used with electronically controlled equipment
klgates.com
V. Insurance Coverage For Cyber Risks
“Electronic Data” Exclusion
2. Exclusions
This insurance does not apply to:
*****
p. Electronic Data
Damages arising out of the loss of, loss of use
of, damage to, corruption of, inability to access,
or inability to manipulate electronic data.
However, this exclusion does not apply to liability for
damages because of "bodily injury".
As used in this exclusion, electronic data means
information, facts or programs stored as or on,
created or used on, or transmitted to or from
computer software, including systems and
applications software, hard or floppy disks,
CDROMs, tapes, drives, cells, data processing
devices or any other media which are used with
electronically controlled equipment.
klgates.com
V. Insurance Coverage For Cyber Risks
Potential avenues to coverage
Coverage may be added through endorsement
ISO “Electronic Data Liability Endorsement” adds “electronic
data” back to the definition of “property damage”
Coverage may have been purchased through the ISO
“Electronic Data Liability Coverage Form”
ISO pre-2001 forms do not except “electronic data” from the
definition of “property damage” and do not exclude
“electronic data”
Even recently issued policies may not contain such
exceptions or exclusions
Zurich American Ins. Co., et al. vs. Sony Corp. of America, et
al., No. 651982/2011 (N.Y. Sup. Ct. New York Cty.)
klgates.com
V. Insurance Coverage For Cyber Risks
Even when the policy contains an exclusion, there may be
coverage if a suit alleges damage to or loss of use of a
computer or computer systems
Eyeblaster, Inc. v. Federal Ins. Co., 613 F.3d 797 (8th Cir.
2010)
The underlying suit alleged injury to the plaintiff’s “computer,
software, and data after he visited [the insured’s] website.” The
definition of “tangible property” excluded “any software, data or
other information that is in electronic form”
The court held that the insurer was obligated to defend the
insured because the complaint alleged “loss of use of tangible
property that is not physically injured” under the second prong
of the “property damage” definition
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage for data breach and other claims
alleging violation of a right to privacy
ISO “Coverage A”
ISO “Coverage B”
klgates.com
V. Insurance Coverage For Cyber Risks
ISO “Coverage A”
SECTION I – COVERAGES
COVERAGE A – BODILY INJURY AND PROPERTY
DAMAGE LIABILITY
1. Insuring Agreement
a. We will pay those sums that the insured
11111becomes legally obligated to pay as damages
11111because
of "bodily injury" or "property
1111damage” to which this insurance applies.
*****
3. "Bodily injury" means bodily injury, sickness or
11111disease sustained by a person, including death
11111resulting from any of these at any time.
klgates.com
V. Insurance Coverage For Cyber Risks
“Electronic Data” exclusion
2. Exclusions
This insurance does not apply to:
*****
p. Electronic Data
Damages arising out of the loss of, loss of use
of, damage to, corruption of, inability to access,
or inability to manipulate electronic data.
However, this exclusion does not apply to
liability for damages because of "bodily injury".
As used in this exclusion, electronic data means
information, facts or programs stored as or on,
created or used on, or transmitted to or from
computer software, including systems and
applications software, hard or floppy disks,
CDROMs, tapes, drives, cells, data processing
devices or any other media which are used with
electronically controlled equipment.
klgates.com
V. Insurance Coverage For Cyber Risks
ISO “Coverage B”
COVERAGE B – PERSONAL AND
ADVERTISING INJURY LIABILITY
1. Insuring Agreement
a. We will pay those sums that the insured
iiiiiiiiibecomes legally obligated to pay as damages
iiiiiiiiibecause of "personal and advertising injury"
iiiiiiiiito which this insurance applies.
*****
14. "Personal and advertising injury" means injury
iiiii1111including consequential "bodily injury", arising out
iiiii1111of one or more of the following offenses:
*****
e. Oral or written publication, in any manner,
iiiiiiiiiiii of material that violates a person's right of
iiiiiiiiiiii privacy;
klgates.com
V. Insurance Coverage For Cyber Risks
ISSUE: Has there been a “publication” that violates a “right of
privacy”?
Some courts have found coverage
Park Univ. Enters., Inc. v. American Cas. Co. Of Reading, PA, 442
F.3d 1239, 1250 (10th Cir. 2006) (Kansas law) (“the [district] court
correctly determined that in layman's terms, ‘[t]he plain and ordinary
meaning of privacy includes the right to be left alone.’ … We
likewise agree with the district court's broad construction of
the term “publication” in favor of [the insured]”)
Zurich American Ins. Co. v. Fieldstone Mortgage Co., 2007 WL
3268460, at *5 (D.Md. 2007) (Maryland law) (“Of the circuits to
examine ‘publication’ in the context of an ‘advertising injury’
provision, the majority have found that the publication need not
be to a third party.”)
klgates.com
V. Insurance Coverage For Cyber Risks
ISSUE: Has there been a “publication” that violates a “right of
privacy”?
Some courts have rejected coverage
Resource Bankshares Corp. v. St. Paul Mercury Ins. Co., 407 F.3d
631, 642 (4th Cir. 2005) (Virginia law) (“[T]he TCPA's unsolicited fax
prohibition protects ‘seclusion’ privacy, for which content is
irrelevant. Unfortunately for [the insured, it did not buy
insurance policies for seclusion damages; instead, it insured
against, among other things, damages arising from violations of
content-based privacy.”)
Recall Total Info. Mgmt., Inc. v. Federal Ins. Co., 2012 WL 469988,
at *6 (Conn. Super. Ct. Jan. 17, 2012) (no coverage for loss of
employee information because “there [wa]s no evidence of
communication to a third party”)
klgates.com
V. Insurance Coverage For Cyber Risks
Potential hurdles to coverage
Exclusions relating to internet activities and breach of
privacy-related laws
“Insureds In Media And Internet Type Businesses”
“Electronic Chatrooms Or Bulletin Boards”
“Recording And Distribution Of Material Or Information In
Violation Of Law”
New 2013 ISO “Amendment Of Personal And Advertising Injury
Definition” endorsement
klgates.com
V. Insurance Coverage For Cyber Risks
“Insureds In Media And Internet Type Businesses”
2. Exclusions
This insurance does not apply to:
*****
j. Insureds In Media And Internet Type
Businesses
"Personal and advertising injury" committed by an
insured whose business is:
(1) Advertising, broadcasting, publishing or
telecasting;
(2) Designing or determining content of web sites
for others; or
(3) An Internet search, access, content or service
provider.
However, this exclusion does not apply to
Paragraphs 14.a., b. and c. of "personal and
advertising injury" under the Definitions section.
For the purposes of this exclusion, the placing of
frames, borders or links, or advertising, for you or
others anywhere on the Internet, is not by itself,
considered the business of advertising,
broadcasting, publishing or telecasting.
klgates.com
V. Insurance Coverage For Cyber Risks
“Electronic Chatrooms Or Bulletin Boards”
2. Exclusions
This insurance does not apply to:
*****
k. Electronic Chatrooms Or Bulletin Boards
"Personal and advertising injury" arising out of an
electronic chatroom or bulletin board the insured
hosts, owns, or over which the insured exercises
control.
klgates.com
V. Insurance Coverage For Cyber Risks
“Distribution Of Material Or Information In Violation Of Law ”
2. Exclusions
This insurance does not apply to:
*****
"Personal and advertising injury" arising directly or
indirectly out of any action or omission that violates or
is alleged to violate:
(1) The Telephone Consumer Protection Act (TCPA),
including any amendment of or addition to such
law;
(2) The CAN-SPAM Act of 2003, including any
amendment of or addition to such law;
(3) The Fair Credit Reporting Act (FCRA), and any
amendment of or addition to such law, including
the Fair and Accurate Credit Transactions Act
(FACTA); or
(4) Any federal, state or local statute, ordinance or
regulation, other than the TCPA, CAN-SPAM Act of
2003 or FCRA and their amendments and
additions, that addresses, prohibits, or limits the
printing, dissemination, disposal, collecting,
recording, sending, transmitting, communicating or
distribution of material or information.
klgates.com
V. Insurance Coverage For Cyber Risks
“Amendment Of Personal And Advertising Injury Definition”
This endorsement modifies insurance provided under the
following:
COMMERCIAL GENERAL LIABILITY COVERAGE PART
With respect to Coverage B Personal And
Advertising Injury Liability, Paragraph 14.e. [“Oral or written
publication, in any manner, of material that violates a person's
right of privacy”] of the Definitions section does not apply.
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage for misappropriation and infringement
claims
ISO “Coverage B”
klgates.com
V. Insurance Coverage For Cyber Risks
ISO “Coverage B”
COVERAGE B – PERSONAL AND
ADVERTISING INJURY LIABILITY
1. Insuring Agreement
a. We will pay those sums that the insured
iiiiiiiiibecomes legally obligated to pay as damages
iiiiiiiiibecause of "personal and advertising injury"
iiiiiiiiito which this insurance applies.
*****
14. "Personal and advertising injury" means injury
iiiiiincluding consequential "bodily injury", arising out
iiiiiof one or more of the following offenses:
*****
11111if. The use of another's advertising idea in your
iiiiiiiiiiii "advertisement"; or
11111g. Infringing upon another's copyright, trade
iiiiiiiiiiiiidress or slogan in your "advertisement".
klgates.com
V. Insurance Coverage For Cyber Risks
“Advertisement” (1998 and subsequent ISO forms)
SECTION V – DEFINITIONS
1. "Advertisement" means a notice that is broadcast or
published to the general public or specific
market segments about your goods, products
or services for the purpose of attracting
customers or supporters. For the purposes of this
definition:
a. Notices that are published include material
placed on the Internet or on similar electronic
means of communication; and
b. Regarding web sites, only that part of a web site
that is about your goods, products or services for
the purposes of attracting customers or
supporters is considered an advertisement.
klgates.com
V. Insurance Coverage For Cyber Risks
“Advertisement” (1996 and prior ISO forms)
SECTION V – DEFINITIONS
1. "Advertising injury" means injury arising out of one
or more of the following offenses:
a. Oral or written publication of material that
slanders or libels a person or organization or
disparages a person's or organization's goods,
products or services;
b. Oral or written publication of material that violates
a person's right of privacy;
c. Misappropriation of advertising ideas or style
of doing business; or
d. Infringement of copyright, title or slogan.
klgates.com
V. Insurance Coverage For Cyber Risks
ISSUE: Has there been an “advertisement”?
May turn on the relevant definition
Oglio Entm't Group, Inc. v. Hartford Cas. Ins. Co., 132 Cal.Rptr.3d
754, 763 (Cal. Ct. App. 2011) (“There is no description of any
advertisement used by [the insured] … This is especially clear,
given that the policy defines advertisement as the widespread
dissemination of information or images with the purpose of selling a
product[.]”) (1998 and prior language)
Sentex Systems, Inc. v. Hartford Acc. & Indem. Co., 93 F.3d 578
(9th Cir. 1998) (“Hartford's principal contention is that the district
court erred … because ‘advertising injury,’ defined in part in the
policy as arising out of the ‘misappropriation of advertising ideas,”’
includes only alleged wrongdoing that involves the text, words, or
form of an advertisement. This policy's language … does not limit
itself to the misappropriation of an actual advertising text. It is
concerned with ‘ideas,’ a broader term.”)
klgates.com
V. Insurance Coverage For Cyber Risks
Potential hurdles to coverage
Same “Coverage B” exclusions discussed in the previous
section
Additional exclusions
“Knowing Violation Of Rights Of Another”
“Unauthorized Use Of Another's Name Or Product”
klgates.com
V. Insurance Coverage For Cyber Risks
“Knowing Violation Of Rights Of Another”
2. Exclusions
This insurance does not apply to:
*****
a. Knowing Violation Of Rights Of Another
"Personal and advertising injury" caused by or at the
direction of the insured with the knowledge that the
act would violate the rights of another and would
inflict "personal and advertising injury".
klgates.com
V. Insurance Coverage For Cyber Risks
“Insureds In Media And Internet Type Businesses”
2. Exclusions
This insurance does not apply to:
*****
l. Unauthorized Use Of Another's Name Or
Product "Personal and advertising injury" arising
out of the unauthorized use of another's name or
product in your e-mail address, domain name or
metatag, or any other similar tactics to mislead
another's potential customers
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage under “traditional” first-party property
policies
Potential coverage for loss of data, computers or computer
systems
Potential coverage for “time element” losses
Business interruption
Extra expense
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage for loss of data, computers or computer
systems
The 2007 standard-form ISO commercial property policy
covers “direct physical loss of or damage to Covered
Property at the premises described in the Declarations
caused by or resulting from any Covered Cause of Loss.”
Such policies may be in the form of broadly worded “all risk,”
“difference in conditions,” “multiperil” or “inland marine”
policies.
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage for “time element” losses
“Business Interruption” coverage generally reimburses the
insured for its loss of earnings or revenue resulting from
covered property damage.
ISO’s “Business Income (and Extra Expense) Coverage Form”
covers the loss of net profit and operating expenses that the
insured “sustain[s] due to the necessary ‘suspension’ of [the
insured’s] ‘operations’ during the ‘period of restoration.’”
“Extra Expense” coverage generally covers the insured for
certain extra expenses incurred to minimize or avoid
business interruption and to resume normal operations.
ISO’s form covers “Extra Expense” to “[a]void or minimize the
‘suspension’ of business and to continue operations at the
described premises or at replacement premises or temporary
locations….”
klgates.com
V. Insurance Coverage For Cyber Risks
ISSUE: is there “direct physical loss of or damage”?
See cases above
A couple other examples
NMS Services Inc. v. Hartford, 62 Fed.Appx. 511, 514(4th Cir.
2003) (upholding coverage for business interruption and extra
expense, finding “no question that [the insured] suffered
damage to its property.”)
Lambrecht & Associates, Inc. v. State Farm Lloyds, 119
S.W.3d 16, 23, 25 (Tex. App. Ct. 2003) (findingn that “the
personal property losses alleged by Lambrecht were ‘physical’
as a matter of law” and holding that “the business income [the
insured] lost as a result of the virus [wa]s covered under the
policy.”)
klgates.com
V. Insurance Coverage For Cyber Risks
Potential limitations to coverage
Some standard forms seek to shift data loss from the principal
coverage grant by excluding electronic data from the definition of
“Covered Property” and instead providing coverage under
“additional coverage” that may be subject to relatively low—
presumptively inadequate—coverage sublimits
2007 ISO Commercial Property Form excepts “electronic data”
from the definition of “Covered Property” and provides coverage
under an “Additional Coverage” that is limited to “$2,500 for all loss
or damage sustained in any one policy year….”
2007 ISO standard-form Business Income (and Extra Expense)
Coverage Form excludes coverage for electronic data under the
main coverage part and provides coverage under an “Additional
Coverage” subject to a $2,500 limit for “all loss sustained and
expense incurred in any one policy year….”
klgates.com
V. Insurance Coverage For Cyber Risks
Potential coverage under other “traditional” policies
Directors’ and Officers’ (D&O)
Errors and Omissions (E&O)
Employment practices liability (EPL)
Eyeblaster, Inc. v. Federal Ins. Co., 613 F.3d 797 (8th Cir. 2010)
(Network Technology E&O policy)
Professional liability
Fiduciary
Crime
Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa.,
691 F.3d 821(6th Cir. 2012) (blanket crime policy)
klgates.com
V. Insurance Coverage For Cyber Risks
New “Cyber” Policies
There will be gaps in “traditional programs”
“Cyber” coverage can be extremely valuable
Types of coverages offered by many insurers
Third-Party Coverages
Privacy And Network Security
Media Liability
Regulatory Liability
First-Party Cyber Coverage
Damage To Computer Systems
Business Interruption And Extra Expense
Remediation
Extortion
klgates.com
V. Insurance Coverage For Cyber Risks
Types of claims and losses that may be covered:
In the event of a data breach
defense and indemnity costs associated with third-party claims
against a company
response costs associated with post-breach remediation, including
notification requirements, credit monitoring, call centers, public
relations efforts, forensics and crisis management
regulatory investigations, fines and/or penalties
misappropriation of intellectual property or confidential
business information
the receipt or transmission of malicious code, DoS attacks, and
other security threats to networks
the cost to restore or recover data that is lost or damaged
business interruption
extortion from cyber attackers who have stolen data
klgates.com
V. Insurance Coverage For Cyber Risks
New “Cyber” Policies
Come under names like “Privacy and Security,” “Network
Security,” and names that incorporate “Cyber,” “Privacy,”
“Media” or some form of “Technology” or “Digital”
As noted, they can be extremely valuable
But they are like snowflakes
This makes successful placement a real challenge
We will end with some tips for a successful placement
klgates.com
V. Insurance Coverage For Cyber Risks
Privacy And Network Security
Typically covers against liability from data breaches,
transmission of malicious code, denial of third-party access to
the insured’s network, and other network security threats
I. INSURING AGREEMENTS.
(A) Data Privacy and Network
Security Liability Insurance
We will pay Damages and Defense
Costs on behalf of the Insured
which the Insured shall become
legally obligated to pay as a result of
a Claim … alleging a Data Privacy
Wrongful Act or a Network
Security Wrongful Act by
the Insured[.]
klgates.com
V. Insurance Coverage For Cyber Risks
Data Privacy Wrongful Act
“Data Privacy Wrongful Act” is defined to include “any negligent
act, error or omission by the Insured that results in: the improper
dissemination of Nonpublic Personal Information” or “any breach
or violation by the Insured of any Data Privacy Laws.”
“Nonpublic Personal Information” is defined as a natural person’s
first name and last name combination with a social security number,
medical or healthcare information or data, financial account
information that would permit access to that individual’s financial
account; or a natural person’s information that is designated as
private by a Data Privacy Law.
“Data Privacy Laws” is defined to include “any Canadian or U.S.,
federal, state, provincial, territorial and local statutes and regulations
governing the confidentiality, control and use of Nonpublic Personal
Information including but not limited to” key laws.
klgates.com
V. Insurance Coverage For Cyber Risks
Network Security Wrongful Act
“Network Security Wrongful Act” is defined to include “any
negligent act, error or omission by the Insured resulting in
Unauthorized Access or Unauthorized Use of the Organization’s
Computer System, the consequences of which include, but are
not limited to:
(1) the failure to prevent Unauthorized Access to, use of,
or
tampering with a Third Party’s computer systems;
(2) the inability of an authorized Third Party to gain access to
the Insured’s services;
(3) the failure to prevent denial or disruption of Internet
service to an authorized Third Party;
(4) the failure to prevent Identity Theft or credit/debit card
fraud; or
(5) the transmission of Malicious Code.
klgates.com
V. Insurance Coverage For Cyber Risks
Media Liability
Typically covers against liability from claims for alleging
infringement of copyright and other intellectual property rights
and misappropriation of ideas or media content
I. INSURING AGREEMENTS.
(B) e-Media Liability Insurance
We will pay Damages and Defense
Costs on behalf of the Insured
which the Insured shall become
legally obligated to pay as a result of
a Claim … alleging a e-Media
Wrongful Act by the Insured[.]
klgates.com
V. Insurance Coverage For Cyber Risks
“e-Media Wrongful Act”
e-Media Wrongful Act” is defined to include “any negligent act,
error or omission by the Insured that results in the following:
(1) infringement of copyright, service mark, trademark, or
misappropriation of ideas or any other intellectual property right,
other than infringement of patents or trade secrets; defamation,
libel, product disparagement, trade libel, false arrest, detention or
imprisonment, or malicious prosecution, infringement or
interference with rights of privacy or publicity; wrongful entry or
eviction; invasion of the right of private occupancy; and/or
plagiarism, misappropriation of ideas under implied contract I
nvasion or other tort related to disparagement or harm to the
reputation or character of any person or organization in the
Insured Entity’s Electronic Advertising or in the Insured Entity’s
Advertising; or
(2) misappropriation or misdirection of lnternet based messages or
media of third parties on the Internet by the Insured, including
meta-tags, web site domains and names, and related cyber
content.
klgates.com
V. Insurance Coverage For Cyber Risks
Regulatory Liability
Many “third-party” cyber risk policies include defense and
indemnity coverage for claims for civil, administrative or
regulatory proceedings, fines and penalties
klgates.com
V. Insurance Coverage For Cyber Risks
Damage To Computer Systems
“First-party” cyber coverage may include damage to or
theft of the insured’s own computer systems and hardware,
and may cover the cost of restoring or recreating stolen or
corrupted daat.
klgates.com
V. Insurance Coverage For Cyber Risks
Business Interruption And Extra Expense
Coverage for business interruption and extra expense
caused by malicious code (viruses, worms, Trojans,
malware, spyware, etc.), DDoS attacks, unauthorized
access to, or theft of, information, and other security
threats to networks.
klgates.com
V. Insurance Coverage For Cyber Risks
Remediation
costs associated with post-data breach notification—
notification required by regulation and voluntary notification
credit monitoring services
forensic investigation to determine the existence or cause
of a breach
public relations efforts and other “crisis management”
expenses
legal services to determine an insured’s indemnification
rights where a third party’s error or omission has caused
the problem
klgates.com
V. Insurance Coverage For Cyber Risks
Extortion
Cyber policies often cover losses resulting from extortion
(payments of an extortionist’s demand to prevent network
loss or implementation of a threat)
klgates.com
V. Insurance Coverage For Cyber Risks
Beware The Fine Print
klgates.com
Where We Can Help
klgates.com
Our Cyber Law and Cybersecurity Approach
Prevent and deter attacks
Provide advice on the recognized security standards by the USG and industry standard
setting organizations
Assist in drafting security policies and procedures
Training and employee education
Prophylactic domain name registration
Aggressively pursue perpetrators
Experienced cyber-forensic investigation team and lab
Civil litigation to unmask perpetrators
Collaboration with law enforcement
Respond to problems
Advice on best practices and policies to establish to manage an identified attack
Assistance in responding to an active attack (K&L Gates Rapid Response Team)
Help in responding to a data breach after the fact
klgates.com
Our Cyber Law and Cybersecurity Approach
Avoid liability
Review of company's cybersecurity policies and standards
Ensure physical, administrative and technical measures are reasonable
Review of company’s data breach policies and procedures against applicable state,
federal and international laws
Review of contractual provisions
Partner, customer, employee
Review of SEC reporting
Advice on establishing best practices
Asses litigation exposure
another company's proprietary or confidential information accessed
consumer class action
Mitigate risk and loss through insurance
We counsel clients regarding insurance coverage for data security breach liability
Traditional policies may respond to cyber liabilities, but there are limitations
New “cyber” insurance products can be valuable as part of a company’s overall strategy to
mitigate cyber risk
klgates.com
klgates.com
Questions
5 81
Download