2014 May Be Cyber Insurance's Most Popular Year Yet

by Zelle LLP
Contact

Insurance Law360 - March 21, 2014

February 2014 may ultimately be seen as the month when the cyber insurance coverage market really began. Although certain insurance companies are writing cyber coverage, and some insureds have acquired that coverage, neither group is currently comprised of significant numbers of entities. That may be about to change.

Two court rulings, one from Washington state and another from New York, have held that liability exposures resulting from the hacking of personally identifiable information (“PII”) are not covered under traditional (i.e., noncyber) liability insurance coverage forms. These rulings alone are likely to drive greater inquiry into cyber coverage. On top of that, the recent media reporting that the malware involved in the Target data breach could have been introduced through one of Target’s vendors has put a focus on a risk corridor that many entities may never have considered, but which they may now actively seek to have insured.

While large data breaches involving tens or hundreds of millions of a company’s records are generally recognized to result in significant liabilities, even the hacking of a relatively small number of records is expensive — potentially cripplingly so for a small or medium-sized business. The average out-of-pocket cost to a company experiencing a small breach, involving under 100,000 records, is $2.4 million, with an additional $3 million being the average lost revenue. See, Ponemon Institute, "2013 Cost of Data Breach Study: Global Analysis," pages 1-2 and page 16 (May 2013).

Indeed, the costs incurred to notify even just 24,000 individuals, a very small relative number, that their PII was exposed averages just above $500,000. Business owners and executives are often shocked to discover their exposure from such relatively small breaches and are left wondering whether their company can survive a seven-figure hit to the bottom line as a result of an uninsured cyber loss.

Many companies have only their traditional liability insurance programs to fall back on in the event of a cyber loss, particularly when the breach involves the hacking of PII. One of the most commonly looked-to coverages following a breach and exposure of PII, is the traditional liability coverage of “personal and advertising injury coverage,” which often covers the oral or written publication of material that violates a person’s right of privacy. That is the very policy provision under which several Sony Corp. entities — SonyCorporation of America (“SCA”) and Sony Computer Entertainment America (“SCEA”) — were seeking coverage from Zurich American Insurance Co. as a result of the hacking of the Sony PlayStation network and resulting theft of PII. 

In a Feb. 21, 2014, ruling, the Supreme Court of New York held there was no coverage available to the Sony entities under the Zurich policy since the acts constituting the insurable offense were not conducted by the policyholder, Sony, but were instead undertaken by unknown third parties. As the trial court noted:

[F]or coverage to actually get triggered it would have to be, the acts have to be conducted or perpetrated by the policyholder. ... In this case I have a situation where we have a hacking, an illegal intrusion into the defendant Sony’s secured sites where they had all of the information (Court Tr. at 76).

The court held that coverage could apply only in the circumstance:

[W]here the defendants, Sony, SCA or SCEA, commits or perpetrates the act of publishing the information. In this case they didn’t do that (Court Tr. at 80).

Accordingly, the court ruled that Zurich had no coverage obligations to the Sony entities. The court noted that its decision is the first to consider the coverage implications of a major hacking incident involving coverage being sought for the alleged public exposure of PII (Court Tr. at 29-30). Risk managers and company executives do not want to risk the future financial health of their respective company’s on such an unsettled area of the law.

A second decision, issued a week after the Sony order, set up another impediment to coverage under traditional liability policy forms for an exposure of PII. On Feb. 28, 2014, the U.S. District Court for Seattle ruled in the case of National Union Fire Insurance Company of Pittsburgh v. Coinstar Inc., holding that the common liability policy exclusion for a “violation of statute in connection with sending, transmitting or communicating any material or information” served to preclude any coverage for the hacking of PII from Coinstar’s video rental kiosks — known to the movie renting public as “Redbox” (Order at 5).

Given the breadth and depth of federal and state statutes pertaining to disclosure of PII, it may be the rare exposure of PII that will take place in a fashion that does not somehow violate any of the existing statutes. Accordingly, as with the Sony decision, this case sets up a significant road block to coverage under traditional liability policies for a hacking incident involving the theft of PII.

In addition to these recent legal impediments to coverage under traditional liability forms for cyber losses, the possibility that malware may be carried into a company’s systems through a trusted vendor raises additional concerns. The terms and conditions of vendor contracts are undoubtedly getting fresh language pertaining to mandatory data-security standards to be met by vendors, likely also including a requirement for indemnification by those vendors. However, since currently available cyber coverage often indemnifies for the transmission of malicious software, one avenue to help mitigate the financial impact of this risk is for a company to require its vendors to carry appropriate cyber coverage with specified minimum limits. 

While both of the recent court rulings will in all probability be appealed, the ultimate result of those appeals will not be binding on any state other than New York and Washington, respectively, and, since the Coinstar case is in federal court, even that precedent is not necessarily binding on Washington state courts.

These recent decisions may well provide the impetus for companies to look more closely at the emerging cyber insurance market. For their part, the insurance companies will need to be sure they are providing a valuable product to the market. Given the risk, it is not especially compelling to a prospective insured to be offered, for example, $5,000 in notification expense coverage when the average cost for consumer notification for even a small breach exceeds $500,000. As the insurance companies and the prospective insureds contemporaneously realize both the need and the market for such insurance — and that it has a very real value worthy of the payment of premium dollars — it may well be that February 2014 will be the tipping point for this type of coverage.

 

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Zelle LLP | Attorney Advertising

Written by:

Zelle  LLP
Contact
more
less

Zelle LLP on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Privacy Policy (Updated: October 8, 2015):
hide

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.

Security

JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.