SlideShare a Scribd company logo
1 of 2
Download to read offline
Financial Services Group       Under lock and key: risk transfer solutions to limit liability
Canadian Advisory
2009
                               for security and privacy data breaches


For more information           Data security increasingly                  provincial legislation. In accordance
please contact:
                               at risk                                     with these statutes, businesses must
National                                                                   ensure that safeguards are implemented
                               There isn’t a day that goes by without      to protect personal information against
Brad Lorimer
Senior Vice President,
                               news of a privacy breach in some part       loss or theft, as well as unauthorized use,
National Director              of the world. In fact, a whole cottage      distribution and disclosure. The public
416.868.2479                   industry has evolved, whereby hundreds of   sector and governments are regulated by
brad.lorimer@aon.ca            websites regularly monitor data security    the Privacy Act, and there are a number
                               breaches. Canada has not been immune        of other statutes that deal specifically with
David A. Griffiths
Senior Vice President          to the privacy breach phenomenon, as        the treatment of personal information by
National Consulting Director   evidenced by the fact that such breaches    health care providers.
416.868.5554                   have more than doubled in this country
david.griffiths@aon.ca         since 2008 according to a June 2008,
                               survey conducted by CA Canada. Most         Enforcement of regulations
Ontario
Mark LeSaevage                 recently, the Heartland Payment Systems     Provincial and federal privacy
Vice President                 breach has affected over 140 banks and      commissioners, who oversee the
416.868.5795                   credit unions, including many from          application of privacy legislation, have the
mark.lesaevage@aon.ca          Canada. Companies and government            right to conduct investigations of alleged
Québec                         agencies that have experienced privacy      violations of privacy laws, which can be
Bernard Dupré                  breaches over the past two years include    quite costly as well as embarrassing. They
Vice President                 Canada Post, Bell Canada, Passport          also have the right to refer non-compliance
514.840.7783                   Canada, The Canadian Imperial Bank of       to the courts, which have wide powers to
bernard.dupre@aon.ca                                                       award damages for privacy breaches.
                               Commerce, Air Canada, The Canadian Bar
Prairies                       Association, DaimlerChrysler Financial
Kathleen Cook                  Services Canada Inc., Club Monaco, and of   Additional legislation
Prairie Region FSG Leader      course Winners/HomeSense.
403.267.7878                                                               Industry Canada has tabled a proposal
kathleen.cook@aon.ca                                                       that will amend PIPEDA to provide for
                               Current privacy regulations                 a national mandatory breach notification
B.C.
                               Private-sector Canadian companies that      law, and there are amendments in the
Paul Lively
Senior Vice President          deal with customer information must         works for many existing statutes, setting
604.443.3353                   abide by the provisions of the Personal     out data management standards and
paul.lively@aon.ca             Information Protection and Electronic       spelling out the consequences of fraudulent
                               Documents Act (PIPEDA) or equivalent        procurement of personal information.




www.aon.com
Under lock and key: risk transfer solutions to limit liability for security and privacy data breaches



Risks to data security                                                                                            It is very important for these entities to review and audit their
                                                                                                                  existing insurance policies to determine what, if any, coverage they
Businesses are under increasing pressure to put data online in order
                                                                                                                  have for first and third party claims arising out of security and
to serve clients. This has resulted in a worldwide technology and
                                                                                                                  privacy breaches.
communications infrastructure that is vulnerable to both internal
and external risks.
                                                                                                                  Risk transfer solutions
With that in mind, companies should take a detailed look at their                                                 Commercial general liability policies may appear to provide some
data security risk management practices and strategies as they                                                    coverage for third–party losses; however, U.S. courts have recently
pertain to sensitive, confidential or proprietary personal identifiable                                           ruled that data is not considered tangible property under certain
information from customers, business partners, prospects or                                                       CGL policies and, as a result, have excluded coverage.
employees in the following areas:
                                                                                                                  Professional liability policies may cover a number of security
    •	 collection	                          •		 aggregation                                                       and privacy breach exposures faced by insureds while rendering
    •	 processing	                          •		 use                                                               professional services to their clients/customers, but may not respond
                                                                                                                  to claims for breaches that arise outside of that arena.
    •	 transfer	                            •	 storage
    •	 distribution	                        •		 destruction                                                       Fidelity, employment related practices, data processing, computer
                                                                                                                  fraud, advertising and kidnap and ransom policies are generally not
It is safe to say that most companies engage in some or all of these
                                                                                                                  intended to cover privacy and data breaches, and there are significant
activities, and thus are at risk for liability stemming from data
                                                                                                                  coverage gaps in each.
security and privacy breaches.

Lawsuits and third-party liability                                                                                Privacy and data loss liability coverage
                                                                                                                  A number of insurance carriers have developed specific privacy
It should come as no surprise that most of the litigious activity
                                                                                                                  and data loss liability coverage products that provide coverage for
involving data security breaches is initiated out of the United States;
                                                                                                                  businesses when data in their care and control is compromised.
however, Canadians are catching on quickly. Class action lawsuits
were brought against Winners and HomeSense in almost every                                                        For the fullest coverage, it is important to determine whether these
Canadian province for damages arising out of the TJX security                                                     policies will respond to claims from employees, customers and
breach. The costs in connection with the potential liability to third                                             corporate clients, as well as from the insured itself for damages,
parties for privacy and data breaches due to corporate negligence, is                                             defense costs, administrative expenses, notification costs, crisis
a growing concern.                                                                                                expenses and credit monitoring expenses.

First-party losses                                                                                                Conclusion
Even if a security breach does not result in a lawsuit or regulatory                                              In determining the most appropriate risk transfer solutions for
investigation, the first-party costs associated with internal                                                     companies seeking to limit their liability for security and privacy
investigations, public and investor damage control, discounted                                                    data breaches, it is highly recommended that advice be procured
services and lost employee productivity can be crippling. Ponemon                                                 from an experienced insurance professional. Only then can a
Institute research indicates that the cost of a data breach is now over                                           decision be made as to whether an alteration and/or endorsement
$200 per compromised customer record.                                                                             to an existing insurance product, or the placement of a specialized
                                                                                                                  stand-alone policy is most appropriate from a coverage and cost
Preparing for increased regulation and                                                                            perspective.
enforcement
                                                                                                                  Brian Rosenbaum LL.B
It is clear that the public is pushing for greater liability for those                                            Aon Financial Services Group
responsible for security and privacy breaches. As a result, entities                                              Director, Legal and Research Practice
that deal with personal, identifiable information should prepare
themselves for the prospect of increased regulation and enforcement
by government, as well as enforcement through private sector
lawsuits.




This publication contains general information only and is intended to provide an overview of legal, liability and insurance issues. The information is not intended to constitute legal or other professional advice.

More Related Content

What's hot

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010kapil_arora
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisThomas Bronack
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trustlmgangi
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentse.law International
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 

What's hot (20)

Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Cyber
Cyber Cyber
Cyber
 
Sector Focus; Information Technology; Issue 1 February 2010
Sector Focus; Information Technology; Issue 1   February 2010Sector Focus; Information Technology; Issue 1   February 2010
Sector Focus; Information Technology; Issue 1 February 2010
 
Tape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysisTape vaulting audit and encryption usage analysis
Tape vaulting audit and encryption usage analysis
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 

Viewers also liked

Procesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosProcesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosGilbert Aubert
 
La importancia de los dividendos
La importancia de los dividendosLa importancia de los dividendos
La importancia de los dividendosblacksmith0007
 
INSEL Presentatie
INSEL PresentatieINSEL Presentatie
INSEL Presentatiefilipba
 
March Problems of the Month
March Problems of the MonthMarch Problems of the Month
March Problems of the MonthMHS
 
ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์weesudamim
 
Matt 28:16-20 The Main Thing
Matt 28:16-20  The Main ThingMatt 28:16-20  The Main Thing
Matt 28:16-20 The Main Thinghungpham
 
Apple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeApple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeVictor Choi
 
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Michel Kuipers
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse NetworkMicah Altman
 
Sbs32 primary assessment
Sbs32 primary assessmentSbs32 primary assessment
Sbs32 primary assessmentkwhite9266
 
WVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersWVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersdmascioli
 
Agenda planner lesson_original
Agenda planner lesson_originalAgenda planner lesson_original
Agenda planner lesson_originalalasandi
 
Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Micah Vandegrift
 
Keboola slides in english
Keboola slides in englishKeboola slides in english
Keboola slides in englishLing19860
 

Viewers also liked (20)

Lembaran kerja bil 2 kvkkvkk
Lembaran kerja bil 2 kvkkvkkLembaran kerja bil 2 kvkkvkk
Lembaran kerja bil 2 kvkkvkk
 
Procesos de Coaching para Ejecutivos
Procesos de Coaching para EjecutivosProcesos de Coaching para Ejecutivos
Procesos de Coaching para Ejecutivos
 
La importancia de los dividendos
La importancia de los dividendosLa importancia de los dividendos
La importancia de los dividendos
 
INSEL Presentatie
INSEL PresentatieINSEL Presentatie
INSEL Presentatie
 
March Problems of the Month
March Problems of the MonthMarch Problems of the Month
March Problems of the Month
 
ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์ส่วนประกอบคอมพิวเตอร์
ส่วนประกอบคอมพิวเตอร์
 
Matt 28:16-20 The Main Thing
Matt 28:16-20  The Main ThingMatt 28:16-20  The Main Thing
Matt 28:16-20 The Main Thing
 
Apple I Phone Korean Reduced Size
Apple I Phone Korean Reduced SizeApple I Phone Korean Reduced Size
Apple I Phone Korean Reduced Size
 
Minecraft
MinecraftMinecraft
Minecraft
 
W hquestion
W hquestionW hquestion
W hquestion
 
Cieaura Presentation
Cieaura PresentationCieaura Presentation
Cieaura Presentation
 
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
Hoogste beoordeling Marin Mount Vision C-XM Pro door Bike Germany - mei 2014
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse Network
 
Sbs32 primary assessment
Sbs32 primary assessmentSbs32 primary assessment
Sbs32 primary assessment
 
4a powerpoint
4a powerpoint4a powerpoint
4a powerpoint
 
Lembaran kerja 1 1
Lembaran kerja 1 1Lembaran kerja 1 1
Lembaran kerja 1 1
 
WVWCFFintroKickOffteachers
WVWCFFintroKickOffteachersWVWCFFintroKickOffteachers
WVWCFFintroKickOffteachers
 
Agenda planner lesson_original
Agenda planner lesson_originalAgenda planner lesson_original
Agenda planner lesson_original
 
Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.Scholarly Communications, Open Access and You.
Scholarly Communications, Open Access and You.
 
Keboola slides in english
Keboola slides in englishKeboola slides in english
Keboola slides in english
 

Similar to Under Lock And Key

The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsClear Technologies
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 

Similar to Under Lock And Key (20)

Breached! The First 48
Breached! The First 48Breached! The First 48
Breached! The First 48
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Under Lock And Key

  • 1. Financial Services Group Under lock and key: risk transfer solutions to limit liability Canadian Advisory 2009 for security and privacy data breaches For more information Data security increasingly provincial legislation. In accordance please contact: at risk with these statutes, businesses must National ensure that safeguards are implemented There isn’t a day that goes by without to protect personal information against Brad Lorimer Senior Vice President, news of a privacy breach in some part loss or theft, as well as unauthorized use, National Director of the world. In fact, a whole cottage distribution and disclosure. The public 416.868.2479 industry has evolved, whereby hundreds of sector and governments are regulated by brad.lorimer@aon.ca websites regularly monitor data security the Privacy Act, and there are a number breaches. Canada has not been immune of other statutes that deal specifically with David A. Griffiths Senior Vice President to the privacy breach phenomenon, as the treatment of personal information by National Consulting Director evidenced by the fact that such breaches health care providers. 416.868.5554 have more than doubled in this country david.griffiths@aon.ca since 2008 according to a June 2008, survey conducted by CA Canada. Most Enforcement of regulations Ontario Mark LeSaevage recently, the Heartland Payment Systems Provincial and federal privacy Vice President breach has affected over 140 banks and commissioners, who oversee the 416.868.5795 credit unions, including many from application of privacy legislation, have the mark.lesaevage@aon.ca Canada. Companies and government right to conduct investigations of alleged Québec agencies that have experienced privacy violations of privacy laws, which can be Bernard Dupré breaches over the past two years include quite costly as well as embarrassing. They Vice President Canada Post, Bell Canada, Passport also have the right to refer non-compliance 514.840.7783 Canada, The Canadian Imperial Bank of to the courts, which have wide powers to bernard.dupre@aon.ca award damages for privacy breaches. Commerce, Air Canada, The Canadian Bar Prairies Association, DaimlerChrysler Financial Kathleen Cook Services Canada Inc., Club Monaco, and of Additional legislation Prairie Region FSG Leader course Winners/HomeSense. 403.267.7878 Industry Canada has tabled a proposal kathleen.cook@aon.ca that will amend PIPEDA to provide for Current privacy regulations a national mandatory breach notification B.C. Private-sector Canadian companies that law, and there are amendments in the Paul Lively Senior Vice President deal with customer information must works for many existing statutes, setting 604.443.3353 abide by the provisions of the Personal out data management standards and paul.lively@aon.ca Information Protection and Electronic spelling out the consequences of fraudulent Documents Act (PIPEDA) or equivalent procurement of personal information. www.aon.com
  • 2. Under lock and key: risk transfer solutions to limit liability for security and privacy data breaches Risks to data security It is very important for these entities to review and audit their existing insurance policies to determine what, if any, coverage they Businesses are under increasing pressure to put data online in order have for first and third party claims arising out of security and to serve clients. This has resulted in a worldwide technology and privacy breaches. communications infrastructure that is vulnerable to both internal and external risks. Risk transfer solutions With that in mind, companies should take a detailed look at their Commercial general liability policies may appear to provide some data security risk management practices and strategies as they coverage for third–party losses; however, U.S. courts have recently pertain to sensitive, confidential or proprietary personal identifiable ruled that data is not considered tangible property under certain information from customers, business partners, prospects or CGL policies and, as a result, have excluded coverage. employees in the following areas: Professional liability policies may cover a number of security • collection • aggregation and privacy breach exposures faced by insureds while rendering • processing • use professional services to their clients/customers, but may not respond to claims for breaches that arise outside of that arena. • transfer • storage • distribution • destruction Fidelity, employment related practices, data processing, computer fraud, advertising and kidnap and ransom policies are generally not It is safe to say that most companies engage in some or all of these intended to cover privacy and data breaches, and there are significant activities, and thus are at risk for liability stemming from data coverage gaps in each. security and privacy breaches. Lawsuits and third-party liability Privacy and data loss liability coverage A number of insurance carriers have developed specific privacy It should come as no surprise that most of the litigious activity and data loss liability coverage products that provide coverage for involving data security breaches is initiated out of the United States; businesses when data in their care and control is compromised. however, Canadians are catching on quickly. Class action lawsuits were brought against Winners and HomeSense in almost every For the fullest coverage, it is important to determine whether these Canadian province for damages arising out of the TJX security policies will respond to claims from employees, customers and breach. The costs in connection with the potential liability to third corporate clients, as well as from the insured itself for damages, parties for privacy and data breaches due to corporate negligence, is defense costs, administrative expenses, notification costs, crisis a growing concern. expenses and credit monitoring expenses. First-party losses Conclusion Even if a security breach does not result in a lawsuit or regulatory In determining the most appropriate risk transfer solutions for investigation, the first-party costs associated with internal companies seeking to limit their liability for security and privacy investigations, public and investor damage control, discounted data breaches, it is highly recommended that advice be procured services and lost employee productivity can be crippling. Ponemon from an experienced insurance professional. Only then can a Institute research indicates that the cost of a data breach is now over decision be made as to whether an alteration and/or endorsement $200 per compromised customer record. to an existing insurance product, or the placement of a specialized stand-alone policy is most appropriate from a coverage and cost Preparing for increased regulation and perspective. enforcement Brian Rosenbaum LL.B It is clear that the public is pushing for greater liability for those Aon Financial Services Group responsible for security and privacy breaches. As a result, entities Director, Legal and Research Practice that deal with personal, identifiable information should prepare themselves for the prospect of increased regulation and enforcement by government, as well as enforcement through private sector lawsuits. This publication contains general information only and is intended to provide an overview of legal, liability and insurance issues. The information is not intended to constitute legal or other professional advice.