82
© Copyright 2013 by K&L Gates LLP. All rights reserved. What Your Company Needs to Know about Cybersecurity June 6, 2013

What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

  • Upload
    others

  • View
    3

  • Download
    1

Embed Size (px)

Citation preview

Page 1: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

© Copyright 2013 by K&L Gates LLP. All rights reserved.

What Your Company Needs to Know about CybersecurityJune 6, 2013

Page 2: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Introductions

Bruce J. HeimanInformation Technology

Policy Partner

David A. BatemanInternet & Technology

Law Partner

Roberta D. AndersonInsurance Coverage

Partner

Page 3: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

I. Managing Attacks on Company Information, Technology, Data and Infrastructure

Page 4: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

Page 5: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

The Spectrum of Cyber Attacks

� Advanced Persistent Threats (“APT”)

� Data Breach and Malware

� Denial of Service attacks (“DDoS”)

� Domain name hijacking

� Corporate impersonation and Phishing

� Employee mobility and disgruntled employees

� Lost or stolen laptops and mobile devices

� Inadequate security and systems: first party and third-party vendors

Page 6: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

Advanced Persistent Threats

� targeted, persistent, evasive and advanced

� nation state sponsored

P.L.A. Unit 61398

“Comment Crew”

Page 7: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

Advanced Persistent Threats

� United States Cyber Command and director of the National Security Agency, Gen. Keith B. Alexander, has said the attacks have resulted in the “greatest transfer of wealth in history.”

Source: New York Times, June 1, 2013.

Page 8: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

Advanced Persistent Threats

� Penetration: Spear Phishing� 67 percent of organizations admit that their current

security activities are insufficient to stop a targeted attack.*

� Duration:� average = 356 days**

� Discovery: External Alerts� 55 percent are not even aware of intrusions*

*Source: Trend Micro, USA. http://www.trendmicro.com/us/enterprise/challeng

es/advance-targeted-attacks/index.html

**Source: Mandiant, “APT1, Exposing One of China’s Cyber Espionage Units”

Page 9: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

Advanced Persistent Threats

� Target Profiles� Industry:

� Information Technology

� Aerospace

� Telecom/Satellite

� Energy

� Engineering/Research/Defense

� Chemical/Pharma

� Activities:� Announcements of China deals

� China presence

Page 10: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

The Spectrum of Cyber Attacks

� Advanced Persistent Threats (“APT”)

� Data Breach and Malware

� Denial of Service attacks (“DDoS”)

� Domain name hijacking

� Corporate impersonation and Phishing

� Employee mobility and disgruntled employees

� Lost or stolen laptops and mobile devices

� Inadequate security and systems: first party and third-party vendors

Page 11: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

The Practical Risks of Cyber Attacks

� Loss of “crown jewels,” IP and trade secrets

� Compromise of customer information, credit cards and other PII

� Loss of web presence and online business

� Interception of email and data communications

� Loss of customer funds and reimbursement of charges

� Supply chain disruption and outright theft

� Brand tarnishment

� Collateral damage

� Legal and regulatory complications

Page 12: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

II. Understanding Legal and Regulatory Risk

Page 13: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

II. LEGAL & REGULATORY RISKS

Bad News

� No system of prevention is perfect.

� There will be a data breach.

Good News

� The Law doesn’t require perfection!

� Reasonable prevention measures

� Compliance with specified procedures to mitigate harm

BEST STRONGEST

Page 14: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

III. Government Regulations and Legislation

Page 15: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

III. APPLICABLE LEGISLATION & REGULATION

We will cover

� FTC Act

� States’ data breach laws

� GLBA

� HIPAA

� NIST standards

� Possible CI standards

Page 16: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Federal: FTC Enforcement & General Standard for Protecting Personal Information

� Enforcement of company commitments

� Reasonable Administrative, Technical, Physical Safeguards appropriate for the …• Size and complexity of company

• Nature and scope of activities

• Sensitivity of personal information

Page 17: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

What is Personally Identifiable Information Needing Protection?

� Name

� Address

� DOB

� Email

� Telephone number

� SSN

� Bank account, credit card numbers

� Processor serial number

Page 18: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

What Are Reasonable Measures?FTC has focused on process in numerous consent

decrees� Designate responsible employee� Identify reasonable foreseeable risks

• Employee training• Information systems• Prevention, detection, response

� Safeguards -- design & implement, test & monitor� Selection & retention of service providers� Evaluate and adjust� Independent assessments

Page 19: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Additional Guidance from HIPAA

• Evaluation

• Transmission• Workforce training

• Integrity• Rule based access to info

• Audit• Workstation/DeviceSecurity

• Security personnel

• Access• Facility access & control

• Security management

TechnicalPhysicalAdministrative

Page 20: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

States: General Standard for Preventing Data Breaches

� Data breach statutes focus on responding to breaches impacting residents of that state

� But almost all include security requirements

� Mostly some version of reasonable security measures

Page 21: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

States: General Standard forResponding to Data Breaches

� What is a breach

� Duty to investigate

� What constitutes a reportable breach

� When do you have to report

� Who to notify

� How to notify

� What does the notice have to say

Page 22: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Federal Requirements of a Breach� GLBA and HIPAA have similar requirements to states

• But recent HIPAA amendments adopt more stringent requirements than GLBA on …

• What is a breach

• Reportable breach

• When mass notice required

� Also, must consider possible violations of the

export control and arms control laws

Page 23: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Selling to the Government …Compliance with NIST Standards

� Federal agencies must meet security standards � De facto requirements for contractors� Sets baseline security controls � Requires adjustment and supplementing based on risk assessment � Just completed 4th revision adopts holistic view, increases focus on privacy,

and addresses new issues • mobile and cloud computing • insider threats • applications security • supply chain risks • advanced persistent threat • trustworthiness, assurance, and resilience of information systems

Page 24: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Possible Standards for Owners/Operatorsof “Critical Infrastructure”

� February Executive Order 13636• CI: Incapacity or destruction would have debilitating impact

o Not commercial IT products or consumer IT services• NIST Lead “Cybersecurity Framework”• Incorporate voluntary consensus standards and

industry best practiceso Internationalo No tech mandates

� Legislative proposals• Arguably define CI more broadly• Adopt greater regulatory approach

o Government (FTC/DHS) sets standards• Mandates > incentives

Page 25: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

IV. Litigation Risks and Case Developments

Page 26: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.com

IV. Litigation Risks and Case Developments � Class Action exposure – Data Breach and Privacy Claims

� In Re LinkedIn User Privacy Litigation (N.D. Cal. 2013)(“abstract” harm leads to dismissal)

� Krottner v. Starbucks Corp., 628 F.3d 1139 (9th Cir. 2010)("credible threat of real and immediate harm”)

� Grigsby v. Valve Corp. (W.D. Wash. 2013)(promises of security overvalued services)

� Class Action exposure – securities litigation� In re Heartland Payment Systems, Inc. (D. N. J. 2009)(80% stock drop leads to

derivative suit)

� Agency Enforcement� FTC v. Wyndham Hotels (D. Ariz. 2012)(2 year Russian hacking)

� FTC v. RockYou, Inc. (N.D.Cal. 2012)(hackers access PII of 32 million users)

� Mass. v. South Shore Hospital (AG enforcement; $750k settlement)

� Indiana v. Wellpoint, Inc. (AG enforcement; $100k settlement)

Page 27: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. SEC Disclosure of Cybersecurity Risks

Page 28: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. SEC Disclosure of Cybersecurity Risks

� SEC Division of Corporation Finance issued guidance on cybersecurity disclosures.

� The guidance in essence states that appropriate disclosures may include four things � material cybersecurity risks—both internal risks and risks

from outsourced functions

� cyber incidents, which individually or in the aggregate pose material risk or cost

� risks of material cyber incidents that may remain undetected for an extended period

� a “[d]escription of relevant insurance coverage” for cyber risks

Page 29: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

VI. Insurance Coverage for Cyber Risks

Page 30: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage under “traditional” third-party CGL policies� Potential coverage for claims alleging damage to, or loss of

use of, third-party data, computers or computer systems (“Coverage A”)

� Potential coverage for data breach and other claims alleging violation of a right to privacy (“Coverage A” and (“Coverage B”)

� Potential coverage for misappropriation and infringement claims

Page 31: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

� Coverage A

SECTION I – COVERAGESCOVERAGE A – BODILY INJURY AND PROPERTY DAMAGE LIABILITY1. Insuring Agreement

a. We will pay those sums that the insured 1111

iiiiiiiiiiiiiiii1becomes legally obligated to pay as damages iiiiiiiiiiiiiiii1because of "bodily injury" or "property iiiiiiiiiiiiiiii1damage” to which this insurance applies. *****

V. Insurance Coverage For Cyber Risks

15. "Property damage" means:a. Physical injury to tangible property,

including all resulting loss of use of that property . All such loss of use shall be deemed to occur at the time of the physical Iinjury that caused it; or

b. Loss of use of tangible property that is not physically injured . All such loss of use shall be deemed to occur at the time of the "occurrence“ that caused it.

Page 32: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� ISSUE: Is data is “tangible property” that can suffer “physical injury”?� Some courts have found coverage

� Retail Systems, Inc. v. CNA Ins. Co. 469 N.W.2d 735, 737 (Minn. Ct. App. 1991) (“data on the tape was of permanent value and was integrated completely with the physical property of the tape … the computer tape and data are tangible property ”)

� Computer Corner, Inc. v. Fireman's Fund Ins. Co., No. CV97-10380, slip op. at 3-4 (2d Dist. Ct. N.M. May 24, 2000) (“computer data is tangible property ”)

Page 33: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� ISSUE: Is data is “tangible property” that can suffer “physical injury”?� Some courts have rejected coverage

� America Online Inc. v. St. Paul Mercury Ins. Co., 207 F. Supp. 2d 459, 467, 468-69 (E.D. Va. 2002) (“the Policy does not cover damage to computer data, software and systems because such items are not tangible property ”)

� State Auto Prop. & Cas. Ins. Co. v. Midwest Computers & More, 147 F.Supp.2d 1113, 1116 (W.D. Okla. 2001) (“Alone, computer data cannot be touched, held, or sensed by the human mind; it has no physical substance. It is not tangible property .”)

Page 34: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential additional hurdles to coverage � “Property damage” definition (ISO 2001 and later forms)

� “Electronic Data” exclusion (ISO 2004 and later forms)

Page 35: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

17. "Property damage" means:a. Physical injury to tangible property, including all

resulting loss of use of that property. All such loss of use shall be deemed to occur at the time of the physical injury that caused it; or

b. Loss of use of tangible property that is not physically injured. All such loss of use shall be deemed to occur at the time of the "occurrence" that caused it.

For the purposes of this insurance, electronic data is not tangible property.As used in this definition, electronic data means information, facts or programs stored as or on, created or used on, or transmitted to or from computer software, including systems and applications software, hard or floppy disks, CDROMs, tapes, drives, cells, data processing devices or any other media which are used with electronically controlled equipment

V. Insurance Coverage For Cyber Risks

� “Property damage” definition

Page 36: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****p. Electronic Data

Damages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data .However, this exclusion does not apply to liability for damages because of "bodily injury".As used in this exclusion, electronic data means information, facts or programs stored as or on, created or used on, or transmitted to or from computer software, including systems and applications software, hard or floppy disks, CDROMs, tapes, drives, cells, data processing devices or any other media which are used with electronically controlled equipment.

V. Insurance Coverage For Cyber Risks

� “Electronic Data” Exclusion

Page 37: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential avenues to coverage � Coverage may be added through endorsement

� ISO “Electronic Data Liability Endorsement” adds “electronic data” back to the definition of “property damage”

� Coverage may have been purchased through the ISO “Electronic Data Liability Coverage Form”

� ISO pre-2001 forms do not except “electronic data” from the definition of “property damage” and do not exclude “electronic data”

� Even recently issued policies may not contain such exceptions or exclusions

� Zurich American Ins. Co., et al. vs. Sony Corp. of America, et al., No. 651982/2011 (N.Y. Sup. Ct. New York Cty.)

Page 38: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Even when the policy contains an exclusion, there may be coverage if a suit alleges damage to or loss of use of a computer or computer systems � Eyeblaster, Inc. v. Federal Ins. Co., 613 F.3d 797 (8th Cir.

2010)� The underlying suit alleged injury to the plaintiff’s “computer,

software, and data after he visited [the insured’s] website.” The definition of “tangible property” excluded “any software, data or other information that is in electronic form”

� The court held that the insurer was obligated to defend the insured because the complaint alleged “loss of use of tangible property that is not physically injured” under the second prong of the “property damage” definition

Page 39: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage for data breach and other claims alleging violation of a right to privacy � ISO “Coverage A”

� ISO “Coverage B”

Page 40: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

SECTION I – COVERAGESCOVERAGE A – BODILY INJURY AND PROPERTY DAMAGE LIABILITY1. Insuring Agreementa. We will pay those sums that the insured 11111becomes legally obligated to pay as damages 11111because of "bodily injury" or "property 1111damage” to which this insurance applies. *****3. "Bodily injury" means bodily injury, sickness or 11111disease sustained by a person , including death 11111resulting from any of these at any time.

V. Insurance Coverage For Cyber Risks

� ISO “Coverage A”

Page 41: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****p. Electronic Data

Damages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data.However, this exclusion does not apply to liability for damages because of "bodily injury".As used in this exclusion, electronic data means information, facts or programs stored as or on, created or used on, or transmitted to or from computer software, including systems and applications software, hard or floppy disks, CDROMs, tapes, drives, cells, data processing devices or any other media which are used with electronically controlled equipment.

V. Insurance Coverage For Cyber Risks

� “Electronic Data” exclusion

Page 42: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

COVERAGE B – PERSONAL AND ADVERTISING INJURY LIABILITY1. Insuring Agreement

a. We will pay those sums that the insured iiiiiiiiibecomes legally obligated to pay as damages iiiiiiiiibecause of "personal and advertising injury"iiiiiiiiito which this insurance applies.*****14. "Personal and advertising injury" means injury iiiii1111including consequential "bodily injury", arising out iiiii1111of one or more of the following offenses:*****

e. Oral or written publication, in any manner, iiiiiiiiiiii of material that violates a person's right of iiiiiiiiiiii privacy ;

V. Insurance Coverage For Cyber Risks

� ISO “Coverage B”

Page 43: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� ISSUE: Has there been a “publication” that violates a “right of privacy”?� Some courts have found coverage

� Park Univ. Enters., Inc. v. American Cas. Co. Of Reading, PA, 442 F.3d 1239, 1250 (10th Cir. 2006) (Kansas law) (“the [district] court correctly determined that in layman's terms, ‘[t]he plain and ordinary meaning of privacy includes the right to be left alone.’ … We likewise agree with the district court's broad cons truction of the term “publication” in favor of [the insured] ”)

� Zurich American Ins. Co. v. Fieldstone Mortgage Co., 2007 WL 3268460, at *5 (D.Md. 2007) (Maryland law) (“Of the circuits to examine ‘publication’ in the context of an ‘advertising injury’provision, the majority have found that the publication need n ot be to a third party .”)

Page 44: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� ISSUE: Has there been a “publication” that violates a “right of privacy”?� Some courts have rejected coverage

� Resource Bankshares Corp. v. St. Paul Mercury Ins. Co., 407 F.3d 631, 642 (4th Cir. 2005) (Virginia law) (“[T]he TCPA's unsolicited fax prohibition protects ‘seclusion’ privacy, for which content is irrelevant. Unfortunately for [the insured, it did not buy insurance policies for seclusion damages ; instead, it insured against, among other things, damages arising from violations of content-based privacy.”)

� Recall Total Info. Mgmt., Inc. v. Federal Ins. Co., 2012 WL 469988, at *6 (Conn. Super. Ct. Jan. 17, 2012) (no coverage for loss of employee information because “there [wa]s no evidence of communication to a third party ”)

Page 45: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential hurdles to coverage � Exclusions relating to internet activities and breach of

privacy-related laws� “Insureds In Media And Internet Type Businesses”

� “Electronic Chatrooms Or Bulletin Boards”

� “Recording And Distribution Of Material Or Information In Violation Of Law”

� New 2013 ISO “Amendment Of Personal And Advertising Injury Definition” endorsement

Page 46: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****j. Insureds In Media And Internet Type

Businesses"Personal and advertising injury" committed by an insured whose business is:(1) Advertising, broadcasting, publishing or

telecasting;(2) Designing or determining content of web sites

for others; or(3) An Internet search, access, content or service

provider.However, this exclusion does not apply to Paragraphs 14.a., b. and c. of "personal and advertising injury" under the Definitions section.

For the purposes of this exclusion, the placing of frames, borders or links, or advertising, for you or others anywhere on the Internet, is not by itself, considered the business of advertising, broadcasting, publishing or telecasting.

V. Insurance Coverage For Cyber Risks

� “Insureds In Media And Internet Type Businesses”

Page 47: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****k. Electronic Chatrooms Or Bulletin Boards

"Personal and advertising injury" arising out of an electronic chatroom or bulletin board the insured hosts, owns, or over which the insured exercises control.

V. Insurance Coverage For Cyber Risks

� “Electronic Chatrooms Or Bulletin Boards”

Page 48: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****"Personal and advertising injury" arising directly or indirectly out of any action or omission that violates or is alleged to violate:(1) The Telephone Consumer Protection Act (TCPA),

including any amendment of or addition to such law;

(2) The CAN-SPAM Act of 2003, including any amendment of or addition to such law;

(3) The Fair Credit Reporting Act (FCRA), and any amendment of or addition to such law, including the Fair and Accurate Credit Transactions Act (FACTA); or

(4) Any federal, state or local statute, ordinance or regulation, other than the TCPA, CAN-SPAM Act of 2003 or FCRA and their amendments and additions, that addresses, prohibits, or limits the printing, dissemination, disposal, collecting, recording, sending, transmitting, communicating or distribution of material or information.

V. Insurance Coverage For Cyber Risks

� “Distribution Of Material Or Information In Violation Of Law ”

Page 49: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

This endorsement modifies insurance provided under the following:

COMMERCIAL GENERAL LIABILITY COVERAGE PART

With respect to Coverage B Personal And Advertising Injury Liability, Paragraph 14.e. [“Oral or written publication, in any manner, of material that violates a person'sright of privacy”] of the Definitions section does not apply.

V. Insurance Coverage For Cyber Risks

� “Amendment Of Personal And Advertising Injury Definition”

Page 50: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage for misappropriation and infringement claims

� ISO “Coverage B”

Page 51: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

COVERAGE B – PERSONAL AND ADVERTISING INJURY LIABILITY1. Insuring Agreement

a. We will pay those sums that the insured iiiiiiiiibecomes legally obligated to pay as damages iiiiiiiiibecause of "personal and advertising injury"iiiiiiiiito which this insurance applies.*****14. "Personal and advertising injury" means injury iiiiiincluding consequential "bodily injury", arising out iiiiiof one or more of the following offenses:*****11111if. The use of another's advertising idea in your iiiiiiiiiiii "advertisement" ; or 11111g. Infringing upon another's copyright, trade iiiiiiiiiiiiidress or slogan in your "advertisement" .

V. Insurance Coverage For Cyber Risks

� ISO “Coverage B”

Page 52: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

SECTION V – DEFINITIONS1. "Advertisement" means a notice that is broadcast or

published to the general public or specific market segments about your goods, products or services for the purpose of attracting customers or supporters . For the purposes of this definition:a. Notices that are published include material

placed on the Internet or on similar electronic means of communication; and

b. Regarding web sites, only that part of a web site that is about your goods, products or services for the purposes of attracting customers or supporters is considered an advertisement.

V. Insurance Coverage For Cyber Risks

� “Advertisement” (1998 and subsequent ISO forms)

Page 53: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

SECTION V – DEFINITIONS1. "Advertising injury" means injury arising out of one or more of the following offenses:

a. Oral or written publication of material that slanders or libels a person or organization or disparages a person's or organization's goods, products or services;

b. Oral or written publication of material that violates a person's right of privacy;

c. Misappropriation of advertising ideas or style of doing business ; or

d. Infringement of copyright, title or slogan .

V. Insurance Coverage For Cyber Risks

� “Advertisement” (1996 and prior ISO forms)

Page 54: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� ISSUE: Has there been an “advertisement”?� May turn on the relevant definition

� Oglio Entm't Group, Inc. v. Hartford Cas. Ins. Co., 132 Cal.Rptr.3d 754, 763 (Cal. Ct. App. 2011) (“There is no description of any advertisement used by [the insured] … This is especially clear, given that the policy defines advertisement as the widespread dissemination of information or images with the purpose of selling a product[.]”) (1998 and prior language)

� Sentex Systems, Inc. v. Hartford Acc. & Indem. Co., 93 F.3d 578(9th Cir. 1998) (“Hartford's principal contention is that the district court erred … because ‘advertising injury,’ defined in part in the policy as arising out of the ‘misappropriation of advertising ideas,”’includes only alleged wrongdoing that involves the text, words, or form of an advertisement. This policy's language … does not limit itself to the misappropriation of an actual advertising text. It is concerned with ‘ideas,’ a broader term.”)

Page 55: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential hurdles to coverage � Same “Coverage B” exclusions discussed in the previous

section

� Additional exclusions� “Knowing Violation Of Rights Of Another”

� “Unauthorized Use Of Another's Name Or Product”

Page 56: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****a. Knowing Violation Of Rights Of Another

"Personal and advertising injury" caused by or at the direction of the insured with the knowledge that the act would violate the rights of another and would inflict "personal and advertising injury".

V. Insurance Coverage For Cyber Risks

� “Knowing Violation Of Rights Of Another”

Page 57: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

2. ExclusionsThis insurance does not apply to:

*****l. Unauthorized Use Of Another's Name Or

Product "Personal and advertising injury" arising out of the unauthorized use of another's name or product in your e-mail address, domain name or metatag, or any other similar tactics to mislead another's potential customers

V. Insurance Coverage For Cyber Risks

� “Insureds In Media And Internet Type Businesses”

Page 58: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage under “traditional” first-party property policies� Potential coverage for loss of data, computers or computer

systems

� Potential coverage for “time element” losses� Business interruption

� Extra expense

Page 59: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage for loss of data, computers or computer systems� The 2007 standard-form ISO commercial property policy

covers “direct physical loss of or damage to Covered Property at the premises described in the Declarations caused by or resulting from any Covered Cause of Loss.”

� Such policies may be in the form of broadly worded “all risk,”“difference in conditions,” “multiperil” or “inland marine”policies.

Page 60: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage for “time element” losses� “Business Interruption” coverage generally reimburses the

insured for its loss of earnings or revenue resulting from covered property damage.

� ISO’s “Business Income (and Extra Expense) Coverage Form”covers the loss of net profit and operating expenses that the insured “sustain[s] due to the necessary ‘suspension’ of [the insured’s] ‘operations’ during the ‘period of restoration.’”

� “Extra Expense” coverage generally covers the insured for certain extra expenses incurred to minimize or avoid business interruption and to resume normal operations.

� ISO’s form covers “Extra Expense” to “[a]void or minimize the ‘suspension’ of business and to continue operations at the described premises or at replacement premises or temporary locations….”

Page 61: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� ISSUE: is there “direct physical loss of or damage”?� See cases above

� A couple other examples� NMS Services Inc. v. Hartford, 62 Fed.Appx. 511, 514(4th Cir.

2003) (upholding coverage for business interruption and extra expense, finding “no question that [the insured] suffered damage to its property.”)

� Lambrecht & Associates, Inc. v. State Farm Lloyds, 119 S.W.3d 16, 23, 25 (Tex. App. Ct. 2003) (findingn that “the personal property losses alleged by Lambrecht were ‘physical’as a matter of law” and holding that “the business income [the insured] lost as a result of the virus [wa]s covered under the policy.”)

Page 62: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential limitations to coverage� Some standard forms seek to shift data loss from the principal

coverage grant by excluding electronic data from the definition of “Covered Property” and instead providing coverage under “additional coverage” that may be subject to relatively low—presumptively inadequate—coverage sublimits

� 2007 ISO Commercial Property Form excepts “electronic data”from the definition of “Covered Property” and provides coverage under an “Additional Coverage” that is limited to “$2,500 for all loss or damage sustained in any one policy year….”

� 2007 ISO standard-form Business Income (and Extra Expense) Coverage Form excludes coverage for electronic data under the main coverage part and provides coverage under an “Additional Coverage” subject to a $2,500 limit for “all loss sustained and expense incurred in any one policy year….”

Page 63: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Potential coverage under other “traditional” policies� Directors’ and Officers’ (D&O)

� Errors and Omissions (E&O)

� Employment practices liability (EPL) � Eyeblaster, Inc. v. Federal Ins. Co., 613 F.3d 797 (8th Cir. 2010)

(Network Technology E&O policy)

� Professional liability

� Fiduciary

� Crime� Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa.,

691 F.3d 821(6th Cir. 2012) (blanket crime policy)

Page 64: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� New “Cyber” Policies� There will be gaps in “traditional programs”

� Types of coverages offered by many insurers� Third-Party Coverages

� Privacy And Network Security

� Media Liability

� Regulatory Liability

� First-Party Cyber Coverage

� Damage To Computer Systems

� Business Interruption And Extra Expense

� Remediation� Extortion

� “Cyber” coverage can be extremely valuable

Page 65: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Types of claims and losses that may be covered:� In the event of a data breach

� defense and indemnity costs associated with third-party claims against a company

� response costs associated with post-breach remediation, including notification requirements, credit monitoring, call centers, public relations efforts, forensics and crisis management

� regulatory investigations, fines and/or penalties

� misappropriation of intellectual property or confidential business information

� the receipt or transmission of malicious code, DoS attacks, and other security threats to networks

� the cost to restore or recover data that is lost or damaged� business interruption� extortion from cyber attackers who have stolen data

Page 66: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� New “Cyber” Policies� Come under names like “Privacy and Security,” “Network

Security,” and names that incorporate “Cyber,” “Privacy,”“Media” or some form of “Technology” or “Digital”

� As noted, they can be extremely valuable

� This makes successful placement a real challenge

� We will end with some tips for a successful placement

� But they are like snowflakes

Page 67: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

I. INSURING AGREEMENTS.(A) Data Privacy and Network

Security Liability InsuranceWe will pay Damages and Defense Costs on behalf of the Insuredwhich the Insured shall become legally obligated to pay as a result of a Claim … alleging a Data Privacy Wrongful Act or a Network Security Wrongful Act by the Insured [.]

V. Insurance Coverage For Cyber Risks

� Privacy And Network Security� Typically covers against liability from data breaches,

transmission of malicious code, denial of third-party access to the insured’s network, and other network security threats

Page 68: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Data Privacy Wrongful Act� “Data Privacy Wrongful Act” is defined to include “any negligent

act, error or omission by the Insured that results in: the improper dissemination of Nonpublic Personal Information” or “any breach or violation by the Insured of any Data Privacy Laws.”

� “Nonpublic Personal Information” is defined as a natural person’s first name and last name combination with a social security number, medical or healthcare information or data, financial account information that would permit access to that individual’s financial account; or a natural person’s information that is designated as private by a Data Privacy Law.

� “Data Privacy Laws” is defined to include “any Canadian or U.S., federal, state, provincial, territorial and local statutes and regulations governing the confidentiality, control and use of Nonpublic Personal Information including but not limited to” key laws.

Page 69: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Network Security Wrongful Act� “Network Security Wrongful Act” is defined to include “any

negligent act, error or omission by the Insured resulting in Unauthorized Access or Unauthorized Use of the Organization’s Computer System, the consequences of which include, but are not limited to:(1) the failure to prevent Unauthorized Access to, use of, or tampering with a Third Party’s computer systems;(2) the inability of an authorized Third Party to gain access to the Insured’s services;(3) the failure to prevent denial or disruption of Internet

service to an authorized Third Party;(4) the failure to prevent Identity Theft or credit/debit card

fraud; or(5) the transmission of Malicious Code.

Page 70: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

I. INSURING AGREEMENTS.

(B) e-Media Liability Insurance We will pay Damages and Defense Costs on behalf of the Insuredwhich the Insured shall become legally obligated to pay as a result of a Claim … alleging a e-Media Wrongful Act by the Insured[.]

V. Insurance Coverage For Cyber Risks

� Media Liability� Typically covers against liability from claims for alleging

infringement of copyright and other intellectual property rightsand misappropriation of ideas or media content

Page 71: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� “ e-Media Wrongful Act”� e-Media Wrongful Act” is defined to include “any negligent act,

error or omission by the Insured that results in the following:(1) infringement of copyright, service mark, trademark, or

misappropriation of ideas or any other intellectual property right, other than infringement of patents or trade secrets; defamation,libel, product disparagement, trade libel, false arrest, detention or imprisonment, or malicious prosecution, infringement or interference with rights of privacy or publicity; wrongful entry or eviction; invasion of the right of private occupancy; and/or plagiarism, misappropriation of ideas under implied contract Invasion or other tort related to disparagement or harm to the reputation or character of any person or organization in the Insured Entity’s Electronic Advertising or in the Insured Entity’s Advertising; or

(2) misappropriation or misdirection of lnternet based messages or media of third parties on the Internet by the Insured, includingmeta-tags, web site domains and names, and related cyber content.

Page 72: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Regulatory Liability� Many “third-party” cyber risk policies include defense and

indemnity coverage for claims for civil, administrative or regulatory proceedings, fines and penalties

Page 73: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Damage To Computer Systems� “First-party” cyber coverage may include damage to or

theft of the insured’s own computer systems and hardware, and may cover the cost of restoring or recreating stolen or corrupted daat.

Page 74: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Business Interruption And Extra Expense� Coverage for business interruption and extra expense

caused by malicious code (viruses, worms, Trojans, malware, spyware, etc.), DDoS attacks, unauthorized access to, or theft of, information, and other security threats to networks.

Page 75: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Remediation� costs associated with post-data breach notification—

notification required by regulation and voluntary notification

� credit monitoring services

� forensic investigation to determine the existence or cause of a breach

� public relations efforts and other “crisis management”expenses

� legal services to determine an insured’s indemnification rights where a third party’s error or omission has caused the problem

Page 76: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Extortion� Cyber policies often cover losses resulting from extortion

(payments of an extortionist’s demand to prevent network loss or implementation of a threat)

Page 77: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

V. Insurance Coverage For Cyber Risks

� Beware The Fine Print

Page 78: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Where We Can Help

Page 79: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Prevent and deter attacks

� Provide advice on the recognized security standards by the USG and industry standard setting organizations

� Assist in drafting security policies and procedures

� Training and employee education

� Prophylactic domain name registration

Aggressively pursue perpetrators

� Experienced cyber-forensic investigation team and lab

� Civil litigation to unmask perpetrators

� Collaboration with law enforcement

Respond to problems

� Advice on best practices and policies to establish to manage an identified attack

� Assistance in responding to an active attack (K&L Gates Rapid Response Team)

� Help in responding to a data breach after the fact

Our Cyber Law and Cybersecurity Approach

Page 80: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.com

Avoid liability

� Review of company's cybersecurity policies and standards� Ensure physical, administrative and technical measures are reasonable

� Review of company’s data breach policies and procedures against applicable state, federal and international laws

� Review of contractual provisions � Partner, customer, employee

� Review of SEC reporting

� Advice on establishing best practices

� Asses litigation exposure

� another company's proprietary or confidential information accessed

� consumer class action

Mitigate risk and loss through insurance

� We counsel clients regarding insurance coverage for data security breach liability

� Traditional policies may respond to cyber liabilities, but there are limitations

� New “cyber” insurance products can be valuable as part of a company’s overall strategy to mitigate cyber risk

Our Cyber Law and Cybersecurity Approach

Page 81: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

klgates.comklgates.comklgates.com

Page 82: What Your Company Needs to Know about Cybersecurity · cybersecurity disclosures. The guidance in essence states that appropriate disclosures may include four things material cybersecurity

81

Questions

5