Articles Posted in Cybersecurity

Published on:

gdpr-cyber-insuranceHave $57 million (or more) to spare? You’re going to need it if you run afoul of the EU’s General Data Protection Regulation (GDPR) without cyber insurance.

In late January 2019, the French data protection authority, CNIL, imposed a fine of €50 million—or roughly $57 million—on Google for violations of the GDPR. The fine is the largest imposed to date under the GDPR, since it came into effect in May 2018. The Google fine highlights a couple of things: the GDPR has teeth, and regulators in the EU won’t hesitate to enforce the regulation. Possibly more frightening to companies subject to the GDPR is that the fine was not imposed because of any data breach or disclosure of sensitive information but, rather, on account of Google’s ordinary data privacy practices.

Continue Reading ›

Published on:

cybersecurity riskEven when you’ve done your utmost to secure your organization’s cybersecurity—you’ve followed the advice of all the experts, you’ve checked all the boxes—you still may have an Achilles’ heel. Your cybersecurity is only as strong as its weakest point, which is often a vendor or supplier. In this context, a vendor could be anything from a cloud service provider, data processor, or IT engineer to an HR consultant, accounting firm, or health care benefits manager, while a supplier could be a key provider of manufacturing components or raw materials.

Continue Reading ›

Published on:

iStock-862471676-rough-seas-e1532450046978-300x292On insurance coverage issues, sometimes the boat seems to be listing in the wrong direction. For example, insurers have long tilted the decks to avoid coverage for “spoofing” attacks and similar kinds of email fraud by throwing their weight behind arguments that such transactions do not involve a “direct loss” from the use of company computers to implement a fraudulent scheme, which they claim their policies require. But in the first half of July, not one, but two federal appellate decisions—Medidata Solutions Inc. v. Federal Insurance Co. and American Tooling Center, Inc. v. Travelers Casualty & Surety Co.rocked the insurers’ boats.

Continue Reading ›

Published on:

Remember the “good” ol’ days when the run-of-the-mill theft involved someone physically taking something tangible? That is so 20th century. Now, thieves and fraudsters are able to use computers iStock-682285434-cards-300x200and the internet to carry out much more complex schemes. The insurance industry has attempted to keep up with the technological evolution in the coverage it provides, but insurers have also used unclear policy language and the complexity and individualized nature of today’s fraudulent schemes to avoid covering the resulting losses. A slew of courts over the past few years have decided whether crime policies—particularly those with a computer fraud coverage component—cover complex, technology-related fraudulent schemes. The Eleventh Circuit recently joined the fray and ruled that computer fraud coverage did not apply to a policyholder’s $11 million loss.

Continue Reading ›

Published on:

iStock-623269348-ai-robotics-thumbs-down-300x175Artificial Intelligence (AI) is a hot topic in industries from manufacturing to the medical profession. Developments in the last ten years have delivered AI technology, once a fiction reserved for the movies, to private corporations and even to everyday homes. Examples include:

  • 2004 Defense Advanced Research Projects Agency (DARPA) sponsors a driverless car grand challenge. Technology developed by the participants eventually allows Google to develop a driverless automobile and modify existing transportation laws.
  • 2005 Honda’s ASIMO humanoid robot can walk as fast as a human, delivering trays to customers in a restaurant setting. The same technology is now used in military robots.
  • 2011 IBM’s Watson wins Jeopardy against top human champions. It is training to provide medical advice to doctors. It can master any domain of knowledge.
  • 2012 Google releases its Knowledge Graph, a semantic search knowledge base, likely to be the first step toward true artificial intelligence.
  • 2013 BRAIN initiative aimed at reverse engineering the human brain receives $3 billion in funding by the White House, following an earlier billion euro European initiative to accomplish the same.
  • 2014 Chatbot convinced 33% of the judges it was human and by doing so passed a restricted version of a Turing Test.

Continue Reading ›

Published on:

The stopwatch is running. Companies are scrambling to figure out how the EU’s General Data Protection Regulation (GDPR)—due to go into effect on May 25, 2018—will affect how they do business.iStock-638619558-300x200 Uncertainty and speculation abound; no one knows exactly how the law will be enforced, particularly with respect to companies domiciled outside the EU, with no EU footprint, who process and hold the personal data of EU residents. But while publications are awash with advice regarding compliance, few tackle the question whether your business is protected against loss in the event of a data breach or other unintentional failure to comply. We strongly suggest that your due diligence include a review of your insurance coverage for GDPR non-compliance, especially for fines, penalties and lawsuits (individual or class action). Qualified coverage counsel should assist in the review, but key areas of focus include:

Coverage for Costs of Compliance

Many costs that companies will incur to comply with GDPR simply will not be covered by any insurance. Insurance is designed to respond to fortuitous loss or liability, not ordinary costs of doing business. Thus, for example, coverage likely is unavailable for expenses to adopt and implement data security measures, maintain required records, respond to individuals’ requests to access or delete their data, or hire a Data Protection Officer.

Continue Reading ›

Published on:

One thing is for certain: cyberattacks have become the norm, not the exception. Not even the NSA is capable of completely warding off security breaches. Major banking and retail institutions, as welliStock-479801118-data-breach-300x200 as the government, are not surprisingly the most likely targets because of the amount of sensitive and private data they control. Still, other companies outside these sectors must heed the warnings and not become the next cyber victim. Protecting against cyber vulnerability is not merely a domestic issue. Rather, multinational companies are prime targets, and are currently undergoing institutional changes to navigate the EU General Data Protection Regulation (GDPR) that goes into effect May 2018.

Continue Reading ›

Published on:

It’s that time of the year when Americans gather together, enjoy a feast, and fall asleep in front of the TV. But before the tryptophan kicks in, we also like to give thanks for the good things that have iStock-623763994-t-giving-300x200happened in the past year. Corporate policyholders can share in the tradition, as this year has produced a number of court decisions that favored insureds and protected their coverage expectations. Here are a few of the cases we are most thankful for:

Harleysville Group Insurance v. Heritage Communities, Inc.

This case out of the South Carolina Supreme Court gave generously to policyholders in a number of ways this year (giving us the opportunity to post in this blog again and again and again). The case involved defective construction claims against a developer. The developer’s insurer, Harleysville, provided a defense under a vague reservation of rights letter. After the underlying plaintiffs were awarded verdicts against the developer, Harleysville sued to avoid covering the judgments. The court ruled against Harleysville on four issues:

  1. Harleysville’s vague, general reservation of rights letter did not effectively reserve its rights to contest coverage under the terms and exclusions in the policy;
  2. Where the underlying verdicts did not apportion the damages between covered and uncovered losses, the insurer bore the burden of proving amounts allocable to uncovered losses. Where the insurer failed to meet that burden, it had to cover the entire verdict;
  3. Punitive damages awarded in the verdicts were found to be covered under Harleysville’s policy; and
  4. The owners’ association, which was asserting the dissolved developer’s coverage rights in the case, had standing to challenge the insurer’s reservation of rights letter.

Harleysville is a case that just keeps on giving.

Verizon Communications v. Illinois National Insurance Company

The duty to provide a defense, or reimburse defense costs, is one of the most important features of liability insurance. You could say it’s the stuffing, where indemnity is the turkey. The Delaware Superior Court emphasized that obligation in Verizon to the tune of $48 million in defense costs that the insurer had refused to pay. This decision was important because it rejected the insurer’s attempt to define the vague term “securities claim” narrowly to avoid its obligation to pay defense costs. More broadly, the court upheld the pro-policyholder interpretative doctrine of contra proferentem, rejecting the insurer’s argument that the doctrine should not apply where the insured is a large, sophisticated corporation. Applying the doctrine, the court held that unless it can be shown that the insured had a hand in drafting the policy language, ambiguous terms should be interpreted against the insurer. A more detailed analysis of the decision by this firm can be found here.

All State Interior Demolition Inc. v. Scottsdale Insurance Company and McMillin Management Services v. Financial Pacific Insurance Company

Thanksgiving dinner is always better with more guests. Additional Insured endorsements in policies extend the invitation to more parties that may require a seat at the table of insurance protection. This is especially important in the construction context, where developers and general contractors rely on numerous subcontractors’ insurance policies to protect them from liability arising from those subcontractors’ work. These two decisions rejected insurers’ attempts to narrow the application of additional insured endorsements.

In All State Interior, previously highlighted here, a New York County trial court interpreted an endorsement broadly, granting additional insured status to companies that didn’t technically contract with the subcontractor, and who weren’t named in the endorsement. The court, in essence, incorporated the terms of the contract between All State and the subcontractor into the endorsement to trigger additional insured coverage for the project owner, site lessor, and construction manager as All State’s “partners, directors, officers, employees, agents and representatives.”

In McMillin, the insurer’s policy granted additional insured status to McMillin, the general contractor of a project, for “liability arising out of [the subcontractor’s] ongoing operations,” and excluded additional insured status for the insured’s completed operations. The insurer denied defense coverage on the basis that the subcontractor had finished working on the project. The California Court of Appeal disagreed, stating that the endorsement’s phrase “arising out of” is broader than “during,” and so the liability did not have to arise while the insured was still working on the project.

Nooter Corporation v. Allianz Underwriters Insurance Company

When it’s time for dessert, allocating the available pie to make sure everyone gets what they deserve can be tricky. This year, Missouri joined the ranks of “all sums” states that maximize coverage for policyholders with long-tail claims stretching over several years. The “all sums” method of allocation allows an insured to allocate all of its damages from long-tail losses to a single year of coverage. This ruling by the Missouri Court of Appeals was based on the plain language of the policies, which promise to indemnify the insured for all sums the insured is legally obligated to pay for occurrences during the policy period. The court also ruled that all triggered primary policies across a period of years need not be exhausted before excess policies in the period selected by the policyholder can be triggered. The court ruled that only the primary policy in one year needs to be exhausted before that year’s excess policies are triggered. For a more thorough analysis of this case, click here.

Medidata Solutions, Inc. v. Federal Insurance Company

Rather than brave the stampedes of Black Friday, one can get good deals on holiday gifts on Cyber Monday. But to protect against cyber thieves, make sure your insurance coverage will protect you. In this case, the U.S. District Court for the Southern District of New York interpreted the computer fraud provision of a crime policy to do just that. Policyholder Medidata was the victim of fraud when someone tricked its employees into wiring money overseas, using spoofed emails that looked like they came from the company’s president. Medidata’s insurer denied its claim, stating that the computer fraud clause of the crime coverage required actual hacking into and manipulation of Medidata’s computer system. But the court sided with Medidata, ruling that the spoofing of emails violated the integrity of the insured’s computer system enough to trigger coverage, and actual entry by hackers was not required by the policy language or by precedent.

We at Pillsbury hope you all had a very Happy Thanksgiving!

Published on:

potholes policiesAs summer comes to a close, road repair crews across the country are identifying the street repairs and potholes that must be filled before the cold weather approaches. Now is also a good time for policyholders to identify some of the “potholes” that may accompany their claims-made insurance policies and get them filled before it is too late.

Continue Reading ›

Published on:

Every single industry or business in this day and age has either been the victim of a cyber attack or is concerned they will be next. A few examples from the last couple of months show how widespread the problem is. In June, a global ransomeware attack quickly spread across 64 countries, impacting organizations from law firms, banks and governments to food producers and hospitals. The attackers demanded $300 in Bitcoin—approximately $977,000 U.S. dollars in total—from each victim to unlock their data. At the annual DefCon computer security conference in late July, hackers took less than 90 minutes to hack voter-ballot machines and at least one hacker even broke into the system wirelessly, suggesting that U.S. computer-ballot boxes may be susceptible to attack.

iStock-528060876-cybersecurity-300x187

The costs and penalties associated with a cyber attack or data breach should not be underestimated. For example, NPR recently calculated the average cost of a health care breach at more than $2.2 million, “not to mention the reputation damage.” And the FCC recently ordered AT&T to pay $25 million in connection with the exposure of more than 250,000 U.S. customers’ information.

Continue Reading ›