SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Financial Services Group       Under lock and key: risk transfer solutions to limit liability
Canadian Advisory
2009
                               for security and privacy data breaches


For more information           Data security increasingly                  provincial legislation. In accordance
please contact:
                               at risk                                     with these statutes, businesses must
National                                                                   ensure that safeguards are implemented
                               There isn’t a day that goes by without      to protect personal information against
Brad Lorimer
Senior Vice President,
                               news of a privacy breach in some part       loss or theft, as well as unauthorized use,
National Director              of the world. In fact, a whole cottage      distribution and disclosure. The public
416.868.2479                   industry has evolved, whereby hundreds of   sector and governments are regulated by
brad.lorimer@aon.ca            websites regularly monitor data security    the Privacy Act, and there are a number
                               breaches. Canada has not been immune        of other statutes that deal specifically with
David A. Griffiths
Senior Vice President          to the privacy breach phenomenon, as        the treatment of personal information by
National Consulting Director   evidenced by the fact that such breaches    health care providers.
416.868.5554                   have more than doubled in this country
david.griffiths@aon.ca         since 2008 according to a June 2008,
                               survey conducted by CA Canada. Most         Enforcement of regulations
Ontario
Mark LeSaevage                 recently, the Heartland Payment Systems     Provincial and federal privacy
Vice President                 breach has affected over 140 banks and      commissioners, who oversee the
416.868.5795                   credit unions, including many from          application of privacy legislation, have the
mark.lesaevage@aon.ca          Canada. Companies and government            right to conduct investigations of alleged
Québec                         agencies that have experienced privacy      violations of privacy laws, which can be
Bernard Dupré                  breaches over the past two years include    quite costly as well as embarrassing. They
Vice President                 Canada Post, Bell Canada, Passport          also have the right to refer non-compliance
514.840.7783                   Canada, The Canadian Imperial Bank of       to the courts, which have wide powers to
bernard.dupre@aon.ca                                                       award damages for privacy breaches.
                               Commerce, Air Canada, The Canadian Bar
Prairies                       Association, DaimlerChrysler Financial
Kathleen Cook                  Services Canada Inc., Club Monaco, and of   Additional legislation
Prairie Region FSG Leader      course Winners/HomeSense.
403.267.7878                                                               Industry Canada has tabled a proposal
kathleen.cook@aon.ca                                                       that will amend PIPEDA to provide for
                               Current privacy regulations                 a national mandatory breach notification
B.C.
                               Private-sector Canadian companies that      law, and there are amendments in the
Paul Lively
Senior Vice President          deal with customer information must         works for many existing statutes, setting
604.443.3353                   abide by the provisions of the Personal     out data management standards and
paul.lively@aon.ca             Information Protection and Electronic       spelling out the consequences of fraudulent
                               Documents Act (PIPEDA) or equivalent        procurement of personal information.




www.aon.com
Under lock and key: risk transfer solutions to limit liability for security and privacy data breaches



Risks to data security                                                                                            It is very important for these entities to review and audit their
                                                                                                                  existing insurance policies to determine what, if any, coverage they
Businesses are under increasing pressure to put data online in order
                                                                                                                  have for first and third party claims arising out of security and
to serve clients. This has resulted in a worldwide technology and
                                                                                                                  privacy breaches.
communications infrastructure that is vulnerable to both internal
and external risks.
                                                                                                                  Risk transfer solutions
With that in mind, companies should take a detailed look at their                                                 Commercial general liability policies may appear to provide some
data security risk management practices and strategies as they                                                    coverage for third–party losses; however, U.S. courts have recently
pertain to sensitive, confidential or proprietary personal identifiable                                           ruled that data is not considered tangible property under certain
information from customers, business partners, prospects or                                                       CGL policies and, as a result, have excluded coverage.
employees in the following areas:
                                                                                                                  Professional liability policies may cover a number of security
    ‱	 collection	                          ‱		 aggregation                                                       and privacy breach exposures faced by insureds while rendering
    ‱	 processing	                          ‱		 use                                                               professional services to their clients/customers, but may not respond
                                                                                                                  to claims for breaches that arise outside of that arena.
    ‱	 transfer	                            ‱	 storage
    ‱	 distribution	                        ‱		 destruction                                                       Fidelity, employment related practices, data processing, computer
                                                                                                                  fraud, advertising and kidnap and ransom policies are generally not
It is safe to say that most companies engage in some or all of these
                                                                                                                  intended to cover privacy and data breaches, and there are significant
activities, and thus are at risk for liability stemming from data
                                                                                                                  coverage gaps in each.
security and privacy breaches.

Lawsuits and third-party liability                                                                                Privacy and data loss liability coverage
                                                                                                                  A number of insurance carriers have developed specific privacy
It should come as no surprise that most of the litigious activity
                                                                                                                  and data loss liability coverage products that provide coverage for
involving data security breaches is initiated out of the United States;
                                                                                                                  businesses when data in their care and control is compromised.
however, Canadians are catching on quickly. Class action lawsuits
were brought against Winners and HomeSense in almost every                                                        For the fullest coverage, it is important to determine whether these
Canadian province for damages arising out of the TJX security                                                     policies will respond to claims from employees, customers and
breach. The costs in connection with the potential liability to third                                             corporate clients, as well as from the insured itself for damages,
parties for privacy and data breaches due to corporate negligence, is                                             defense costs, administrative expenses, notification costs, crisis
a growing concern.                                                                                                expenses and credit monitoring expenses.

First-party losses                                                                                                Conclusion
Even if a security breach does not result in a lawsuit or regulatory                                              In determining the most appropriate risk transfer solutions for
investigation, the first-party costs associated with internal                                                     companies seeking to limit their liability for security and privacy
investigations, public and investor damage control, discounted                                                    data breaches, it is highly recommended that advice be procured
services and lost employee productivity can be crippling. Ponemon                                                 from an experienced insurance professional. Only then can a
Institute research indicates that the cost of a data breach is now over                                           decision be made as to whether an alteration and/or endorsement
$200 per compromised customer record.                                                                             to an existing insurance product, or the placement of a specialized
                                                                                                                  stand-alone policy is most appropriate from a coverage and cost
Preparing for increased regulation and                                                                            perspective.
enforcement
                                                                                                                  Brian Rosenbaum LL.B
It is clear that the public is pushing for greater liability for those                                            Aon Financial Services Group
responsible for security and privacy breaches. As a result, entities                                              Director, Legal and Research Practice
that deal with personal, identifiable information should prepare
themselves for the prospect of increased regulation and enforcement
by government, as well as enforcement through private sector
lawsuits.




This publication contains general information only and is intended to provide an overview of legal, liability and insurance issues. The information is not intended to constitute legal or other professional advice.

Weitere Àhnliche Inhalte

Was ist angesagt?

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010kapil_arora
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentse.law International
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 

Was ist angesagt? (20)

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cyber
Cyber Cyber
Cyber
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 

Andere mochten auch

Procesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosProcesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosGilbert Aubert
 
La importancia de los dividendos
La importancia de los dividendosLa importancia de los dividendos
La importancia de los dividendosblacksmith0007
 
INSEL Presentatie
INSEL PresentatieINSEL Presentatie
INSEL Presentatiefilipba
 
March Problems of the Month
March Problems of the MonthMarch Problems of the Month
March Problems of the MonthMHS
 
àžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒ
àžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒàžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒ
àžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒweesudamim
 
Matt 28:16-20 The Main Thing
Matt 28:16-20  The Main ThingMatt 28:16-20  The Main Thing
Matt 28:16-20 The Main Thinghungpham
 
Apple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeApple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeVictor Choi
 
Cieaura Presentation
Cieaura PresentationCieaura Presentation
Cieaura PresentationDenis Augustin
 
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Michel Kuipers
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse NetworkMicah Altman
 
Sbs32 primary assessment
Sbs32 primary assessmentSbs32 primary assessment
Sbs32 primary assessmentkwhite9266
 
WVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersWVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersdmascioli
 
Agenda planner lesson_original
Agenda planner lesson_originalAgenda planner lesson_original
Agenda planner lesson_originalalasandi
 
Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Micah Vandegrift
 
Keboola slides in english
Keboola slides in englishKeboola slides in english
Keboola slides in englishLing19860
 

Andere mochten auch (20)

Lembaran kerja bil 2 kvkkvkk
Lembaran kerja bil 2 kvkkvkkLembaran kerja bil 2 kvkkvkk
Lembaran kerja bil 2 kvkkvkk
 
Procesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosProcesos de Coaching para Ejecutivos
Procesos de Coaching para Ejecutivos
 
La importancia de los dividendos
La importancia de los dividendosLa importancia de los dividendos
La importancia de los dividendos
 
INSEL Presentatie
INSEL PresentatieINSEL Presentatie
INSEL Presentatie
 
March Problems of the Month
March Problems of the MonthMarch Problems of the Month
March Problems of the Month
 
àžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒ
àžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒàžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒ
àžȘàčˆàž§àž™àž›àžŁàž°àžàž­àžšàž„àž­àžĄàžžàžŽàž§àč€àž•àž­àžŁàčŒ
 
Matt 28:16-20 The Main Thing
Matt 28:16-20  The Main ThingMatt 28:16-20  The Main Thing
Matt 28:16-20 The Main Thing
 
Apple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeApple I Phone Korean Reduced Size
Apple I Phone Korean Reduced Size
 
Minecraft
MinecraftMinecraft
Minecraft
 
W hquestion
W hquestionW hquestion
W hquestion
 
Cieaura Presentation
Cieaura PresentationCieaura Presentation
Cieaura Presentation
 
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse Network
 
Sbs32 primary assessment
Sbs32 primary assessmentSbs32 primary assessment
Sbs32 primary assessment
 
4a powerpoint
4a powerpoint4a powerpoint
4a powerpoint
 
Lembaran kerja 1 1
Lembaran kerja 1 1Lembaran kerja 1 1
Lembaran kerja 1 1
 
WVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersWVWCFFintroKickOffteachers
WVWCFFintroKickOffteachers
 
Agenda planner lesson_original
Agenda planner lesson_originalAgenda planner lesson_original
Agenda planner lesson_original
 
Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.
 
Keboola slides in english
Keboola slides in englishKeboola slides in english
Keboola slides in english
 

Ähnlich wie Under Lock And Key

Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48Resilient Systems
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 

Ähnlich wie Under Lock And Key (20)

Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 

KĂŒrzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

KĂŒrzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Under Lock And Key

  • 1. Financial Services Group Under lock and key: risk transfer solutions to limit liability Canadian Advisory 2009 for security and privacy data breaches For more information Data security increasingly provincial legislation. In accordance please contact: at risk with these statutes, businesses must National ensure that safeguards are implemented There isn’t a day that goes by without to protect personal information against Brad Lorimer Senior Vice President, news of a privacy breach in some part loss or theft, as well as unauthorized use, National Director of the world. In fact, a whole cottage distribution and disclosure. The public 416.868.2479 industry has evolved, whereby hundreds of sector and governments are regulated by brad.lorimer@aon.ca websites regularly monitor data security the Privacy Act, and there are a number breaches. Canada has not been immune of other statutes that deal specifically with David A. Griffiths Senior Vice President to the privacy breach phenomenon, as the treatment of personal information by National Consulting Director evidenced by the fact that such breaches health care providers. 416.868.5554 have more than doubled in this country david.griffiths@aon.ca since 2008 according to a June 2008, survey conducted by CA Canada. Most Enforcement of regulations Ontario Mark LeSaevage recently, the Heartland Payment Systems Provincial and federal privacy Vice President breach has affected over 140 banks and commissioners, who oversee the 416.868.5795 credit unions, including many from application of privacy legislation, have the mark.lesaevage@aon.ca Canada. Companies and government right to conduct investigations of alleged QuĂ©bec agencies that have experienced privacy violations of privacy laws, which can be Bernard DuprĂ© breaches over the past two years include quite costly as well as embarrassing. They Vice President Canada Post, Bell Canada, Passport also have the right to refer non-compliance 514.840.7783 Canada, The Canadian Imperial Bank of to the courts, which have wide powers to bernard.dupre@aon.ca award damages for privacy breaches. Commerce, Air Canada, The Canadian Bar Prairies Association, DaimlerChrysler Financial Kathleen Cook Services Canada Inc., Club Monaco, and of Additional legislation Prairie Region FSG Leader course Winners/HomeSense. 403.267.7878 Industry Canada has tabled a proposal kathleen.cook@aon.ca that will amend PIPEDA to provide for Current privacy regulations a national mandatory breach notification B.C. Private-sector Canadian companies that law, and there are amendments in the Paul Lively Senior Vice President deal with customer information must works for many existing statutes, setting 604.443.3353 abide by the provisions of the Personal out data management standards and paul.lively@aon.ca Information Protection and Electronic spelling out the consequences of fraudulent Documents Act (PIPEDA) or equivalent procurement of personal information. www.aon.com
  • 2. Under lock and key: risk transfer solutions to limit liability for security and privacy data breaches Risks to data security It is very important for these entities to review and audit their existing insurance policies to determine what, if any, coverage they Businesses are under increasing pressure to put data online in order have for first and third party claims arising out of security and to serve clients. This has resulted in a worldwide technology and privacy breaches. communications infrastructure that is vulnerable to both internal and external risks. Risk transfer solutions With that in mind, companies should take a detailed look at their Commercial general liability policies may appear to provide some data security risk management practices and strategies as they coverage for third–party losses; however, U.S. courts have recently pertain to sensitive, confidential or proprietary personal identifiable ruled that data is not considered tangible property under certain information from customers, business partners, prospects or CGL policies and, as a result, have excluded coverage. employees in the following areas: Professional liability policies may cover a number of security ‱ collection ‱ aggregation and privacy breach exposures faced by insureds while rendering ‱ processing ‱ use professional services to their clients/customers, but may not respond to claims for breaches that arise outside of that arena. ‱ transfer ‱ storage ‱ distribution ‱ destruction Fidelity, employment related practices, data processing, computer fraud, advertising and kidnap and ransom policies are generally not It is safe to say that most companies engage in some or all of these intended to cover privacy and data breaches, and there are significant activities, and thus are at risk for liability stemming from data coverage gaps in each. security and privacy breaches. Lawsuits and third-party liability Privacy and data loss liability coverage A number of insurance carriers have developed specific privacy It should come as no surprise that most of the litigious activity and data loss liability coverage products that provide coverage for involving data security breaches is initiated out of the United States; businesses when data in their care and control is compromised. however, Canadians are catching on quickly. Class action lawsuits were brought against Winners and HomeSense in almost every For the fullest coverage, it is important to determine whether these Canadian province for damages arising out of the TJX security policies will respond to claims from employees, customers and breach. The costs in connection with the potential liability to third corporate clients, as well as from the insured itself for damages, parties for privacy and data breaches due to corporate negligence, is defense costs, administrative expenses, notification costs, crisis a growing concern. expenses and credit monitoring expenses. First-party losses Conclusion Even if a security breach does not result in a lawsuit or regulatory In determining the most appropriate risk transfer solutions for investigation, the first-party costs associated with internal companies seeking to limit their liability for security and privacy investigations, public and investor damage control, discounted data breaches, it is highly recommended that advice be procured services and lost employee productivity can be crippling. Ponemon from an experienced insurance professional. Only then can a Institute research indicates that the cost of a data breach is now over decision be made as to whether an alteration and/or endorsement $200 per compromised customer record. to an existing insurance product, or the placement of a specialized stand-alone policy is most appropriate from a coverage and cost Preparing for increased regulation and perspective. enforcement Brian Rosenbaum LL.B It is clear that the public is pushing for greater liability for those Aon Financial Services Group responsible for security and privacy breaches. As a result, entities Director, Legal and Research Practice that deal with personal, identifiable information should prepare themselves for the prospect of increased regulation and enforcement by government, as well as enforcement through private sector lawsuits. This publication contains general information only and is intended to provide an overview of legal, liability and insurance issues. The information is not intended to constitute legal or other professional advice.