Don’t Wait Until It’s Too Late: Top 10 Recommendations for Negotiating Your Cyber Insurance Policy

Pillsbury Winthrop Shaw Pittman LLP
Contact

As more and more companies of all sizes ranging across a wide spectrum of industries have been exposed to network and data security breaches in recent years, the market for insurance products dedicated to cover cyber risks has grown just as fast. With policies sold under names like “cyberinsurance,” “privacy breach insurance,” “media liability insurance” and “network security insurance,” the market for this coverage often seems chaotic, with premiums and terms varying dramatically from one insurer to the next.

Unlike more traditional insurance policies that contain very similar terms, conditions and exclusions no matter which insurer issues them, cyber insurance policies are far from uniform. Prior to placing or renewing a cyber policy, it is therefore crucial to understand not only what you are being offered, but also how to negotiate coverage for the risks inherent in your business. Every policy’s coverage is different. Before you buy or renew a cyber policy, be sure to review and understand the following guidelines.

Please see full Alert below for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Pillsbury Winthrop Shaw Pittman LLP | Attorney Advertising

Written by:

Pillsbury Winthrop Shaw Pittman LLP
Contact
more
less

Pillsbury Winthrop Shaw Pittman LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.