SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Financial Services Group       Under lock and key: risk transfer solutions to limit liability
Canadian Advisory
2009
                               for security and privacy data breaches


For more information           Data security increasingly                  provincial legislation. In accordance
please contact:
                               at risk                                     with these statutes, businesses must
National                                                                   ensure that safeguards are implemented
                               There isn’t a day that goes by without      to protect personal information against
Brad Lorimer
Senior Vice President,
                               news of a privacy breach in some part       loss or theft, as well as unauthorized use,
National Director              of the world. In fact, a whole cottage      distribution and disclosure. The public
416.868.2479                   industry has evolved, whereby hundreds of   sector and governments are regulated by
brad.lorimer@aon.ca            websites regularly monitor data security    the Privacy Act, and there are a number
                               breaches. Canada has not been immune        of other statutes that deal specifically with
David A. Griffiths
Senior Vice President          to the privacy breach phenomenon, as        the treatment of personal information by
National Consulting Director   evidenced by the fact that such breaches    health care providers.
416.868.5554                   have more than doubled in this country
david.griffiths@aon.ca         since 2008 according to a June 2008,
                               survey conducted by CA Canada. Most         Enforcement of regulations
Ontario
Mark LeSaevage                 recently, the Heartland Payment Systems     Provincial and federal privacy
Vice President                 breach has affected over 140 banks and      commissioners, who oversee the
416.868.5795                   credit unions, including many from          application of privacy legislation, have the
mark.lesaevage@aon.ca          Canada. Companies and government            right to conduct investigations of alleged
Québec                         agencies that have experienced privacy      violations of privacy laws, which can be
Bernard Dupré                  breaches over the past two years include    quite costly as well as embarrassing. They
Vice President                 Canada Post, Bell Canada, Passport          also have the right to refer non-compliance
514.840.7783                   Canada, The Canadian Imperial Bank of       to the courts, which have wide powers to
bernard.dupre@aon.ca                                                       award damages for privacy breaches.
                               Commerce, Air Canada, The Canadian Bar
Prairies                       Association, DaimlerChrysler Financial
Kathleen Cook                  Services Canada Inc., Club Monaco, and of   Additional legislation
Prairie Region FSG Leader      course Winners/HomeSense.
403.267.7878                                                               Industry Canada has tabled a proposal
kathleen.cook@aon.ca                                                       that will amend PIPEDA to provide for
                               Current privacy regulations                 a national mandatory breach notification
B.C.
                               Private-sector Canadian companies that      law, and there are amendments in the
Paul Lively
Senior Vice President          deal with customer information must         works for many existing statutes, setting
604.443.3353                   abide by the provisions of the Personal     out data management standards and
paul.lively@aon.ca             Information Protection and Electronic       spelling out the consequences of fraudulent
                               Documents Act (PIPEDA) or equivalent        procurement of personal information.




www.aon.com
Under lock and key: risk transfer solutions to limit liability for security and privacy data breaches



Risks to data security                                                                                            It is very important for these entities to review and audit their
                                                                                                                  existing insurance policies to determine what, if any, coverage they
Businesses are under increasing pressure to put data online in order
                                                                                                                  have for first and third party claims arising out of security and
to serve clients. This has resulted in a worldwide technology and
                                                                                                                  privacy breaches.
communications infrastructure that is vulnerable to both internal
and external risks.
                                                                                                                  Risk transfer solutions
With that in mind, companies should take a detailed look at their                                                 Commercial general liability policies may appear to provide some
data security risk management practices and strategies as they                                                    coverage for third–party losses; however, U.S. courts have recently
pertain to sensitive, confidential or proprietary personal identifiable                                           ruled that data is not considered tangible property under certain
information from customers, business partners, prospects or                                                       CGL policies and, as a result, have excluded coverage.
employees in the following areas:
                                                                                                                  Professional liability policies may cover a number of security
    •	 collection	                          •		 aggregation                                                       and privacy breach exposures faced by insureds while rendering
    •	 processing	                          •		 use                                                               professional services to their clients/customers, but may not respond
                                                                                                                  to claims for breaches that arise outside of that arena.
    •	 transfer	                            •	 storage
    •	 distribution	                        •		 destruction                                                       Fidelity, employment related practices, data processing, computer
                                                                                                                  fraud, advertising and kidnap and ransom policies are generally not
It is safe to say that most companies engage in some or all of these
                                                                                                                  intended to cover privacy and data breaches, and there are significant
activities, and thus are at risk for liability stemming from data
                                                                                                                  coverage gaps in each.
security and privacy breaches.

Lawsuits and third-party liability                                                                                Privacy and data loss liability coverage
                                                                                                                  A number of insurance carriers have developed specific privacy
It should come as no surprise that most of the litigious activity
                                                                                                                  and data loss liability coverage products that provide coverage for
involving data security breaches is initiated out of the United States;
                                                                                                                  businesses when data in their care and control is compromised.
however, Canadians are catching on quickly. Class action lawsuits
were brought against Winners and HomeSense in almost every                                                        For the fullest coverage, it is important to determine whether these
Canadian province for damages arising out of the TJX security                                                     policies will respond to claims from employees, customers and
breach. The costs in connection with the potential liability to third                                             corporate clients, as well as from the insured itself for damages,
parties for privacy and data breaches due to corporate negligence, is                                             defense costs, administrative expenses, notification costs, crisis
a growing concern.                                                                                                expenses and credit monitoring expenses.

First-party losses                                                                                                Conclusion
Even if a security breach does not result in a lawsuit or regulatory                                              In determining the most appropriate risk transfer solutions for
investigation, the first-party costs associated with internal                                                     companies seeking to limit their liability for security and privacy
investigations, public and investor damage control, discounted                                                    data breaches, it is highly recommended that advice be procured
services and lost employee productivity can be crippling. Ponemon                                                 from an experienced insurance professional. Only then can a
Institute research indicates that the cost of a data breach is now over                                           decision be made as to whether an alteration and/or endorsement
$200 per compromised customer record.                                                                             to an existing insurance product, or the placement of a specialized
                                                                                                                  stand-alone policy is most appropriate from a coverage and cost
Preparing for increased regulation and                                                                            perspective.
enforcement
                                                                                                                  Brian Rosenbaum LL.B
It is clear that the public is pushing for greater liability for those                                            Aon Financial Services Group
responsible for security and privacy breaches. As a result, entities                                              Director, Legal and Research Practice
that deal with personal, identifiable information should prepare
themselves for the prospect of increased regulation and enforcement
by government, as well as enforcement through private sector
lawsuits.




This publication contains general information only and is intended to provide an overview of legal, liability and insurance issues. The information is not intended to constitute legal or other professional advice.

Contenu connexe

Tendances

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010kapil_arora
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentse.law International
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 

Tendances (20)

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cyber
Cyber Cyber
Cyber
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 

En vedette

Procesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosProcesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosGilbert Aubert
 
La importancia de los dividendos
La importancia de los dividendosLa importancia de los dividendos
La importancia de los dividendosblacksmith0007
 
INSEL Presentatie
INSEL PresentatieINSEL Presentatie
INSEL Presentatiefilipba
 
March Problems of the Month
March Problems of the MonthMarch Problems of the Month
March Problems of the MonthMHS
 
ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์weesudamim
 
Matt 28:16-20 The Main Thing
Matt 28:16-20  The Main ThingMatt 28:16-20  The Main Thing
Matt 28:16-20 The Main Thinghungpham
 
Apple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeApple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeVictor Choi
 
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Michel Kuipers
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse NetworkMicah Altman
 
Sbs32 primary assessment
Sbs32 primary assessmentSbs32 primary assessment
Sbs32 primary assessmentkwhite9266
 
WVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersWVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersdmascioli
 
Agenda planner lesson_original
Agenda planner lesson_originalAgenda planner lesson_original
Agenda planner lesson_originalalasandi
 
Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Micah Vandegrift
 
Keboola slides in english
Keboola slides in englishKeboola slides in english
Keboola slides in englishLing19860
 

En vedette (20)

Lembaran kerja bil 2 kvkkvkk
Lembaran kerja bil 2 kvkkvkkLembaran kerja bil 2 kvkkvkk
Lembaran kerja bil 2 kvkkvkk
 
Procesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosProcesos de Coaching para Ejecutivos
Procesos de Coaching para Ejecutivos
 
La importancia de los dividendos
La importancia de los dividendosLa importancia de los dividendos
La importancia de los dividendos
 
INSEL Presentatie
INSEL PresentatieINSEL Presentatie
INSEL Presentatie
 
March Problems of the Month
March Problems of the MonthMarch Problems of the Month
March Problems of the Month
 
ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์
 
Matt 28:16-20 The Main Thing
Matt 28:16-20  The Main ThingMatt 28:16-20  The Main Thing
Matt 28:16-20 The Main Thing
 
Apple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeApple I Phone Korean Reduced Size
Apple I Phone Korean Reduced Size
 
Minecraft
MinecraftMinecraft
Minecraft
 
W hquestion
W hquestionW hquestion
W hquestion
 
Cieaura Presentation
Cieaura PresentationCieaura Presentation
Cieaura Presentation
 
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse Network
 
Sbs32 primary assessment
Sbs32 primary assessmentSbs32 primary assessment
Sbs32 primary assessment
 
4a powerpoint
4a powerpoint4a powerpoint
4a powerpoint
 
Lembaran kerja 1 1
Lembaran kerja 1 1Lembaran kerja 1 1
Lembaran kerja 1 1
 
WVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersWVWCFFintroKickOffteachers
WVWCFFintroKickOffteachers
 
Agenda planner lesson_original
Agenda planner lesson_originalAgenda planner lesson_original
Agenda planner lesson_original
 
Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.
 
Keboola slides in english
Keboola slides in englishKeboola slides in english
Keboola slides in english
 

Similaire à Under Lock And Key

The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 

Similaire à Under Lock And Key (20)

Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 

Dernier

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Dernier (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Under Lock And Key

  • 1. Financial Services Group Under lock and key: risk transfer solutions to limit liability Canadian Advisory 2009 for security and privacy data breaches For more information Data security increasingly provincial legislation. In accordance please contact: at risk with these statutes, businesses must National ensure that safeguards are implemented There isn’t a day that goes by without to protect personal information against Brad Lorimer Senior Vice President, news of a privacy breach in some part loss or theft, as well as unauthorized use, National Director of the world. In fact, a whole cottage distribution and disclosure. The public 416.868.2479 industry has evolved, whereby hundreds of sector and governments are regulated by brad.lorimer@aon.ca websites regularly monitor data security the Privacy Act, and there are a number breaches. Canada has not been immune of other statutes that deal specifically with David A. Griffiths Senior Vice President to the privacy breach phenomenon, as the treatment of personal information by National Consulting Director evidenced by the fact that such breaches health care providers. 416.868.5554 have more than doubled in this country david.griffiths@aon.ca since 2008 according to a June 2008, survey conducted by CA Canada. Most Enforcement of regulations Ontario Mark LeSaevage recently, the Heartland Payment Systems Provincial and federal privacy Vice President breach has affected over 140 banks and commissioners, who oversee the 416.868.5795 credit unions, including many from application of privacy legislation, have the mark.lesaevage@aon.ca Canada. Companies and government right to conduct investigations of alleged Québec agencies that have experienced privacy violations of privacy laws, which can be Bernard Dupré breaches over the past two years include quite costly as well as embarrassing. They Vice President Canada Post, Bell Canada, Passport also have the right to refer non-compliance 514.840.7783 Canada, The Canadian Imperial Bank of to the courts, which have wide powers to bernard.dupre@aon.ca award damages for privacy breaches. Commerce, Air Canada, The Canadian Bar Prairies Association, DaimlerChrysler Financial Kathleen Cook Services Canada Inc., Club Monaco, and of Additional legislation Prairie Region FSG Leader course Winners/HomeSense. 403.267.7878 Industry Canada has tabled a proposal kathleen.cook@aon.ca that will amend PIPEDA to provide for Current privacy regulations a national mandatory breach notification B.C. Private-sector Canadian companies that law, and there are amendments in the Paul Lively Senior Vice President deal with customer information must works for many existing statutes, setting 604.443.3353 abide by the provisions of the Personal out data management standards and paul.lively@aon.ca Information Protection and Electronic spelling out the consequences of fraudulent Documents Act (PIPEDA) or equivalent procurement of personal information. www.aon.com
  • 2. Under lock and key: risk transfer solutions to limit liability for security and privacy data breaches Risks to data security It is very important for these entities to review and audit their existing insurance policies to determine what, if any, coverage they Businesses are under increasing pressure to put data online in order have for first and third party claims arising out of security and to serve clients. This has resulted in a worldwide technology and privacy breaches. communications infrastructure that is vulnerable to both internal and external risks. Risk transfer solutions With that in mind, companies should take a detailed look at their Commercial general liability policies may appear to provide some data security risk management practices and strategies as they coverage for third–party losses; however, U.S. courts have recently pertain to sensitive, confidential or proprietary personal identifiable ruled that data is not considered tangible property under certain information from customers, business partners, prospects or CGL policies and, as a result, have excluded coverage. employees in the following areas: Professional liability policies may cover a number of security • collection • aggregation and privacy breach exposures faced by insureds while rendering • processing • use professional services to their clients/customers, but may not respond to claims for breaches that arise outside of that arena. • transfer • storage • distribution • destruction Fidelity, employment related practices, data processing, computer fraud, advertising and kidnap and ransom policies are generally not It is safe to say that most companies engage in some or all of these intended to cover privacy and data breaches, and there are significant activities, and thus are at risk for liability stemming from data coverage gaps in each. security and privacy breaches. Lawsuits and third-party liability Privacy and data loss liability coverage A number of insurance carriers have developed specific privacy It should come as no surprise that most of the litigious activity and data loss liability coverage products that provide coverage for involving data security breaches is initiated out of the United States; businesses when data in their care and control is compromised. however, Canadians are catching on quickly. Class action lawsuits were brought against Winners and HomeSense in almost every For the fullest coverage, it is important to determine whether these Canadian province for damages arising out of the TJX security policies will respond to claims from employees, customers and breach. The costs in connection with the potential liability to third corporate clients, as well as from the insured itself for damages, parties for privacy and data breaches due to corporate negligence, is defense costs, administrative expenses, notification costs, crisis a growing concern. expenses and credit monitoring expenses. First-party losses Conclusion Even if a security breach does not result in a lawsuit or regulatory In determining the most appropriate risk transfer solutions for investigation, the first-party costs associated with internal companies seeking to limit their liability for security and privacy investigations, public and investor damage control, discounted data breaches, it is highly recommended that advice be procured services and lost employee productivity can be crippling. Ponemon from an experienced insurance professional. Only then can a Institute research indicates that the cost of a data breach is now over decision be made as to whether an alteration and/or endorsement $200 per compromised customer record. to an existing insurance product, or the placement of a specialized stand-alone policy is most appropriate from a coverage and cost Preparing for increased regulation and perspective. enforcement Brian Rosenbaum LL.B It is clear that the public is pushing for greater liability for those Aon Financial Services Group responsible for security and privacy breaches. As a result, entities Director, Legal and Research Practice that deal with personal, identifiable information should prepare themselves for the prospect of increased regulation and enforcement by government, as well as enforcement through private sector lawsuits. This publication contains general information only and is intended to provide an overview of legal, liability and insurance issues. The information is not intended to constitute legal or other professional advice.