Technology Media Communications Industry Session Introductions for Networking Discussion: Deciphering the E&O/Cyber Policy Download slides and handouts at www.rims.org/RIMS14 Or use the RIMS 2014 App (Session # IND021) Recording of this session via any media type is strictly prohibited. Page 1 What to Expect Today 1. 2. 3. 4. 5. 6. 7. Networking & Optional Exchange of Contact Information Trends & Implications Group Challenge Cyber Coverage Terms Where is the E&O/Cyber Policy today Proactive Measures to Manage Risk RIMS 2015 – Topics for next Tech/Media/Comm Session Takeaways: Glossary of E&O/Cyber coverage terms Sample Provision Wording Recording of this session via any media type is strictly prohibited. Page 2 Introductions for Networking – Speakers • Tim Burke – Marsh FINPRO West Zone Practice Leader - Commercial Errors & Omissions • Holly Daley – Willis San Francisco, Tech Media Telecom Practice Former Risk Manager: Hitachi Data Systems, PG&E, Park Lane Hotels • Lora Figgat – NetApp, Risk Manager, Sunnyvale Former Risk Manager: Symantec Corporation • Bert Wells – Partner, Covington & Burling LLP, New York Policyholder-Side Attorney – Insurance Recovery – Transactional Matters – Policy Enhancements Recording of this session via any media type is strictly prohibited. Page 3 Introductions for Networking – Participants Your Name / Company / Location Download slides and handouts at www.rims.org/RIMS14 Or use the RIMS 2014 App (Session # IND021) Recording of this session via any media type is strictly prohibited. Page 4 Macro Trends • • • • High profile data breaches Increasing centrality of privacy & IT security Regulatory scrutiny & evolving legal landscape Supply chain risk Recording of this session via any media type is strictly prohibited. Page 5 The Compliance Scramble Mismatch Implications • • • • Vendor scrutiny Contractual risk transfer Indemnification Insurance requirements Recording of this session via any media type is strictly prohibited. Page 6 E&O/Cyber: Additional Insured Status a. You as Customer perspective • • Why you require AI status from your customers/partners When your customer/partner will not meet your requirement b. You as Vendor perspective ● Why your customer requires AI status of you as their vendor/partner ● As a vendor, should you provide AI status to customers/partners c. Additional insured endorsements Recording of this session via any media type is strictly prohibited. Page 7 Where Is the E&O/Cyber Policy Today? Standardization - ISO, markets E&O blend vs. stand-alone Prior acts - average discovery lag 253-days Menu of coverage pieces available: • • typically offered by special request Recording of this session via any media type is strictly prohibited. Page 8 Deciphering the E&O/Cyber Policy Network Security & Multimedia Liability Cyber Security Liability Computer Security Insurance Network & Information Liability Commerce or Internet Security Insurance Privacy & Network Security Liability Intellectual Property Insurance Internet Security Liability Privacy and Security Insurance Cyber & Crime Liability Data Insurance Recording of this session via any media type is strictly prohibited. Page 9 Cyber Insurance Overview Common Insuring Agreements Insuring Agreement ISO Description Third Party Liability Network Security Liability Security Breach Liability Privacy Liability Programming Errors and Omissions Liability Media Liability Website Publishing Liability or Media Liability Network security failure Failure to safeguard confidential information Advertising & Personal Injury First Party Privacy Expenses Breach Response Costs Security Breach Expense Privacy Regulatory Actions Not available First party expenses to manage data breach Defense costs, fines & penalties First Party Network Interruption Business Interruption Not available Dependent Business Interruption Not available Data Restoration Replacement or Restoration of Electronic Data Loss of net income from network down time Vendor downtime Costs to replace damages information assets Recording of this session via any media type is strictly prohibited. Page 10 Deciphering the E&O/Cyber Policy – Glossary Glossary of cyber insurance terms Recording of this session via any media type is strictly prohibited. Page 11 Role Play: What will you do differently next time? Let’s open dialogue within the group this morning. Chime Your CEO just sent you an email … To open: Please turn your chairs into groups of 8-10. Recording of this session via any media type is strictly prohibited. Page 12 Role Play: What will you do differently next time? Congratulations on your brand new job in the Risk Management Department of ARROW STORES Following a highly-publicized data breach resulting in a 40% sales decline – and attributable to a vendor’s security lapse – your CEO asks your Risk Management team to get the company back on track. Here is your new email: Please join me for lunch today in my office at high noon. I would like hear from your team: • Hindsight – Two steps or protocols Arrow could have implemented to avoid this mess. • Lessons Learned – Two steps or protocols you propose we start developing this afternoon. PERRY N. ARROW CEO ARROW STORES, INC. Recording of this session via any media type is strictly prohibited. Page 13 Risk Management – Best Practices • Create Tools to manage contract requirements Provision Templates Playbook Escalate to RM as advised (per SOW, regions, fallback/fallforward) • Distribute to stakeholders Post on RM site Training and partnering: Legal, Procurement, Sales, Finance • Develop response protocols Incident reporting directions (coverage assessment) Breach response plan: spokesperson, notification process, legal team identified Breach tabletop exercise Recording of this session via any media type is strictly prohibited. Page 14 Playbook– Prepared Responses to Your Customers’ Requirements & Requests (Hypothetical Example Below) Request Your Policy Coverage Carve out to Security & Privacy limitation of liability liability for data security to allow for unlimited liability Limit Risk Tolerance $20M Subject to approval, up to $20M Recording of this session via any media type is strictly prohibited. Page 15 Sample Contract Provision for Cyber Insurance Vendor shall procure and maintain the following insurance: Errors and Omissions Liability Insurance to cover loss arising from errors and omissions in the performance of all Services hereunder, including loss arising from destruction of data, in an amount of at least [$_______] per occurrence. Cyber-Risk, Network Security, or other coverage (regardless of name) to cover the first-party losses and liability of Customer arising from breaches of security of data or computer networks of Vendor or Customer due to Vendor’s acts, errors and omissions, including such losses arising from [specific events or causes]; in an amount of at least [$_______] per occurrence. [Other types and amounts of coverage as may be required.] Each such liability policy shall name Customer as an Additional Insured for such liability of the Customer, and each such first-party policy shall name Customer as a Loss Payee. Such insurance shall be worldwide; primary and non-contributing with respect to any insurance or self-insurance of Customer, subject to the reasonable advance approval of Customer and issued by insurers having ratings reasonably satisfactory to Customer. Recording of this session via any media type is strictly prohibited. Page 16 Actionable Points & Issues To share with your brokers, insurers, legal teams • • • Review coverage wordings Bring key IT personnel to underwriting meetings Discuss the reality of claims process Recording of this session via any media type is strictly prohibited. Page 17 Wrap Up and Q&A • Q&A Recording of this session via any media type is strictly prohibited. Page 18 Our Next Session: RIMS 2015 in New Orleans Brainstorm Topic ideas for our next Tech Media Communications Industry Session Thank you Recording of this session via any media type is strictly prohibited. Page 19