Commit100 | IT Blog - About Information Technology
Commit100 | IT Blog - About Information Technology
Insurance, Security

Have you been security breached?

Security concept: Lock on digital screen, contrast, 3d render

Have you been security breached? As security pros put it, “you have either been security breached or you just don’t yet know it”. With the increasing use of digital technology, more and more information is exchanged in cyberspace. A lot of that information is personal data, for the storage, transfer, and exchange of which there are many rules and regulations. In the case of a security breach, such as the one that happened to LinkedIn,  the business who holds the data is held liable.

What is cyber liability insurance

Cyber liability insurance cover (CLIC) has been available on the market since about 2006. CLIC policies cover a business’ liability for a data breach in which the firm’s customers’ personal information, such as Social Security or credit card numbers, is exposed or stolen by a hacker or other criminal who has gained access to the firm’s electronic network. This insurance allows to mitigate risks related to security breaches, namely, by transferring the risk (quantified in financial value) – insuring against it. Such risks are primarily related to the mandatory data breach requirements in most countries (Canada, US, EU) – if you have been breached, you must notify your clients, and the costs of notification can be very high (including loss of revenue, lawsuits, etc.).

Such costs force many business owners to consider CLIC among the other risk management tools – flood, fire, theft insurance. Cyber insurance cover is enormously beneficial in the event of a large-scale security incident, as it provides a funding mechanism to recover from major losses, helping businesses return to normal operations.

What CLIC covers from

Presently, CLIC can include:

  • Data breach/privacy crisis management cover (expenses related to the management of an incident, the investigation, the remediation, data subject notification, call management, credit checking for data subjects, legal costs, court attendance and regulatory fines)
  • Multimedia/Media liability cover (third-party damages, like defacement of website and intellectual property rights infringement)
  • Extortion liability cover (losses due to a threat of extortion, professional fees related to dealing with the extortion)
  • Network security liability (third-party damages as a result of denial of access, costs related to data on third-party suppliers, costs related to the theft of data on third-party systems).

Apart from that, cyber liability cover can include expenses related to mitigating data breach risks, such as security audit costs (Commit100 has done such audits for its clients).

Who needs cyber liability insurance?

All businesses carry confidential client information, however there are different classes of such information. For example, breaches related to data such as credit card information, medical information, social insurance numbers will be of higher risk that breaches related to name and address. For example, in Ontario there exists the Personal Health Information Protection Act (PHIPA), which puts very stringent requirements on handling of individuals’ health information.

 

Sources

http://www.computerweekly.com/news/2240202703/An-introduction-to-cyber-liability-insurance-cover

https://www.irmi.com/online/insurance-glossary/terms/c/cyber-and-privacy-insurance.aspx

https://en.wikipedia.org/wiki/Cyber-Insurance

http://www.chubb.com/international/canada/csi/chubb16692.html

July 1, 2016by artemy@kirnichansky.com

Recent Posts

  • Outlook 2016 cannot log on: quick and easy workaround
  • What’s the value of Network and System Diagrams?
  • Does your company have a Style Guide?
  • Helping our Valued Customer Keep a Tight Schedule
  • The Technology Business Management Revolution

Recent Comments

    Archives

    • June 2017
    • May 2017
    • April 2017
    • December 2016
    • November 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016

    Categories

    • Active directory
    • Business analysis
    • Disaster Recovery
    • Insurance
    • IT Management
    • IT Policies
    • IT Strategy
    • ITIL
    • Microsoft Office
    • Productivity
    • Security
    • Software
    • Software Engineering
    • System Design
    • Tips and Tricks
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Commit100.com

    • Sample Page

    “We started the COMMIT100 BLOG to provide you with fresh new ideas about IT Managed Services, Computer System, Network & Software Engineering, and anything we find worth sharing with you.”

    © 2016 COMMIT100.com
    Privacy Policy | This blog is updated on a MONTHLY basis.