Tag Archives: cyber risks

Please check out: “Will Insurance Cover Target’s $19 Million MasterCard Settlement?”

Phishing -Credit card data theftI wrote a post that discusses card brand liabilities – the demands from payment card brands and payment card processors after a data breach of credit card and debit card numbers – and getting cyberinsurance to cover those liabilities.  The post discusses Target’s disclosure of a $19 million settlement with MasterCard for card brand liabilities and whether Target’s cyberinsurance might cover the losses.

You can find the post on my firm‘s insurance recovery and insurance coverage blog, the BT Policyholder Protection Blog. My future insurance-related posts will be found there.

Please join me for “2014 Year in Review: A National Insurance Recovery Webinar”

free webinarAs noted previously here, at Barnes & Thornburg LLP‘s Policyholder Protection blog, I welcome you to mark your calendar and join us for a national insurance recovery webinar on Tuesday, Jan. 27 at 3 p.m. (Eastern). The Barnes & Thornburg insurance recovery attorneys will review 2014’s major legal developments and trends in insurance coverage and recovery. You will learn more about how the events of the past year affected:

  • Directors and Officers (D&O) coverage
  • Excess umbrella liability coverage
  • Coverage for business torts and consumer false advertising claims
  • Coverage for environmental contamination claims
  • Cyber liability and data breach

 

You won’t want to miss this lively discussion of some of 2014’s most important developments for policyholders. Webinar access and dial-in information will be delivered upon registration.

 

Register today!

 

2.0 General CLE Credits Pending for CA, GA, IL, IN, MD, MN, OH, PA

Disclaimer:

This blog is for informational purposes only. This may be considered attorney advertising in some states. The opinions on this blog do not necessarily reflect those of the author’s law firm and/or the author’s past and/or present clients. By reading it, no attorney-client relationship is formed. If you want legal advice, please retain an attorney licensed in your jurisdiction. The opinions expressed here belong only the individual contributor(s). © All rights reserved. 2015.

Please check out: “If Your System Was Attacked By ‘Backoff’ Malware, Would Your Insurance Cover A Data Breach Involving Credit Card Numbers?”

binary code and computer monitorsI wrote a post that discusses the disclosure of so-called “Backoff” malware by the Department of Homeland Security. I also discuss and how insurance might apply to retailers and card processors facing a data privacy incident (or a data breach) with allegedly exposed credit cards, debit cards, and payment cards in general as a result of a Backoff malware attack.

You can find the post on my firm‘s insurance recovery and insurance coverage blog, the BT Policyholder Protection Blog. My future insurance-related posts will be found there.

Please check out: “Scott Godes Interview Featured in, ‘If Attorney Needed to Explain Cyber Coverage, the Policy Is Not Clear.'”

binary code and computer monitorsI wrote a post that discusses an interview I recently gave for an Advisen article regarding cyber risk and cyberinsurance.

You can find the post on my firm’s new blog, the BT Policyholder Protection Blog.  My future insurance-related posts will be found there.

Please check out: “Increasing data breach costs should lead to a review of insurance policies and vendor contracts.”

binary code and computer monitorsI wrote a post that discusses increasing data breach costs, as discussed in the latest Ponemon Institute report, and gives some tips regarding risk management, insurance coverage, and vendor contracts, in light of this expanding and changing risk.

You can find the post on my firm’s new blog, the BT Policyholder Protection Blog.  My future insurance-related posts will be found there.

Please check out: “5 Tips For Reviewing And Buying Cyberinsurance.”

Highway Signpost "Cyber Attack"Law360 published an article that I wrote with tips for buying and reviewing cyberinsurance, with special tips for retailers who are considering buying or reviewing cyberinsurance policies.

The article is “5 Tips for Reviewing and Buying Cyberinsurance.”  With the recent rash of cyberattacks, data breaches, and other incidents affecting retailers around the country, it is a good time to turn a careful eye to insurance for cyber and privacy risks.  After a privacy, cybersecurity, or data breach incident, retailers may face a host of issues as a result of those incidents.  The issues may include individual consumer claims, putative class actions, federal and state investigations and regulatory inquiries, and demands from banks, credit card brands, and/or credit card processors.

The introduction to the article reads:

It seems that the cybersecurity was all over the news in 2013, and in 2014, retailers cannot escape the potential of a data breach. In fact, it’s been reported that six further retailers may be suffering data breaches and cyberattacks, beyond the two big retailers that were in the news over the holiday season. If you already have forgotten about your personal New Year’s resolution, consider one for your business: understanding your insurance policies with a view toward coverage for cyber risks.

If you are interested in some take aways regarding your cyberinsurance program, including considerations relating to Payment Card Industry Council compliance (“PCI compliance”), account data compromise events (“ADC events”), case management fees, operational fraud demands, operational reimbursement demands, and more, please take a look at the entire article.  Please check out “5 Tips for Reviewing and Buying Cyberinsurance.”

Disclaimer:

This blog is for informational purposes only. This may be considered attorney advertising in some states. The opinions on this blog do not necessarily reflect those of the author’s law firm and/or the author’s past and/or present clients. By reading it, no attorney-client relationship is formed. If you want legal advice, please retain an attorney licensed in your jurisdiction. The opinions expressed here belong only the individual contributor(s). © All rights reserved. 2014.

Please join me for: Data Breaches and Advanced Persistent Threats: Planning for Them, Getting Them Resolved, and Getting Insurance to Cover Them

Cybersecurity_email_banner

Hosted by

DS+Logo+Green+2_67+inch+72dpGeneral_Dynamics

Data Breaches and Advanced Persistent Threats:
Planning for Them, Getting Them Resolved, and Getting Insurance to Cover Them

Dickstein Shapiro LLP and General Dynamics Fidelis Cybersecurity Solutions invite you to participate in a webcast, “Data Breaches and Advanced Persistent Threats: Planning for Them, Getting Them Resolved, and Getting Insurance to Cover Them” on Friday, June 21, 2013. This interactive program, of particular interest to chief privacy officers, risk managers, those in government affairs, and privacy counsel, will discuss how enterprises can deal with a risk that has been in the news on a daily basis: data breaches and advanced persistent threats. With these risks quickly becoming board-level concerns, enterprises should have a plan in advance of a data breach and know what happens after a data breach. The discussion will include:

  • Internal and forensics investigations;
  • Inquiries from governmental entities, including State Attorneys General and the Federal Trade Commission; and
  • Insurance coverage that could apply to help defray the costs related to getting the breach or threat resolved.

This webcast will be interactive with an opportunity for Q&A with our speakers.

DATE
Friday, June 21, 2013
2:00 PM – 3:00 PM ET

SPEAKERS
Scott Godes, co-chair of the American Bar Association’s Computer Technology Subcommittee of the Insurance Coverage Litigation Committee
Brian Finch, Global Security Practice Leader, Dickstein Shapiro LLP
Divonne Smoyer, Partner, State Attorneys General Practice, Dickstein Shapiro LLP; IAPP Certified Information Privacy Professional
Jim Jaeger, Vice President, Cybersecurity Services, General Dynamics Fidelis Cybersecurity Solutions

REGISTER
Please click here to register for this complimentary program.

Disclaimer:

This blog is for informational purposes only. This may be considered attorney advertising in some states. The opinions on this blog do not necessarily reflect those of the author’s law firm and/or the author’s past and/or present clients. By reading it, no attorney-client relationship is formed. If you want legal advice, please retain an attorney licensed in your jurisdiction. The opinions expressed here belong only the individual contributor(s). © All rights reserved. 2013.

The materials in this message are provided for informational purposes only and do not constitute legal advice. In some states, this email message may be considered advertising. Please see Dickstein Shapiro’s full disclaimer.

Copyright Dickstein Shapiro LLP 2013. All Rights Reserved.  Reposted with permission.

« Older Entries