<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; cyber claims</title>
	<atom:link href="https://privacyriskreport.com/tag/cyber-claims/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</title>
		<link>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-security-during-coronavirus-pandemic</link>
		<comments>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/#comments</comments>
		<pubDate>Thu, 26 Mar 2020 18:37:52 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=2077</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Understandably, there has been a lot of information concerning the novel coronavirus and its impact on insurance, business and, of course, people.  However, there has not been much discussion on what happens if there is a cyber event over the... <a class="more-link" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Understandably, there has been a lot of information concerning the novel coronavirus and its impact on insurance, business and, of course, people.  However, there has not been much discussion on what happens if there is a cyber event over the next couple of weeks as the world deals with the COVID-19 pandemic.  A cyber security breach during the novel coronavirus pandemic could sever the one thread connecting remote employees to their place of work.</p>
<p>While it is still early, there should be little dispute that the current pandemic will have a profound impact on the workplace, which, in turn, will have a profound impact on the use of data. <a href="https://www.forbes.com/sites/heathermcgowan/2020/03/23/the-coronavirus-pandemic-accelerates-the-future-of-work-and-provides-opportunity/#5c1d28f3317f" target="_blank">Commentators have already offered the following concerning the new workplace</a>:</p>
<p><em>If the future of work requires restructured workplaces, redefined roles, rapid learning, and reserves of trust—and it does, organizations are being challenged to do all that and more as they address the coronavirus pandemic. While we have long spoken about <a class="color-link" title="https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity" href="https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity" target="_blank" rel="nofollow noopener noreferrer" data-ga-track="ExternalLink:https://en.wikipedia.org/wiki/Volatility,_uncertainty,_complexity_and_ambiguity">VUCA (volatile, uncertain, complex, and ambiguous)</a> environments, we are finally and undoubtedly facing one.  In the span of a few weeks, the world’s economy traveled a path from cautious observation and common-sense health advisories to massive cancelations, business shutdowns, and work from home mandates. JPMorgan, AT&amp;T, Google, Amazon, Nike, Facebook, among many, many more are hustling to virtualize business operations as social distancing continues to be the best practice to “flatten the curve” of contagion. </em></p>
<p><em>Coronavirus, it turns out, might be the great catalyst for business transformation. </em></p>
<p>Without a doubt, once we get through this pandemic, we will need to address how the new workplace impacts privacy.  The two most immediate concerns may be the opportunities for hackers and how regulations will be impacted by the overwhelming health and economic concerns.</p>
<ol>
<li><strong>The Pandemic May Provide Opportunities For Hackers</strong></li>
</ol>
<p>While there are a number of uncertainties during this unprecedented situation, we have been able to piece together some information concerning our world in March of 2020:</p>
<ul>
<li>We are in pandemic caused by the novel coronavirus;</li>
<li>In response to the pandemic, people are working from home transferring information without the security measures found in the workplace;</li>
<li>The pandemic has created turmoil in the world’s financial and employment markets; and</li>
<li>Workers are feeling not secure, which may lead to snap decisions.</li>
</ul>
<p>Unfortunately, these four factors give rise to the perfect environment for opportunistic hackers.  Data collectors may want to take the following approach in the coming weeks:</p>
<ul>
<li><strong>Protect data transfers</strong>. In the coming weeks, as the pandemic unfolds, employee training or discussions on data safety will be key.  Data collectors should remind their new remote workforce of the emerging risks they face in transferring data.</li>
</ul>
<ul>
<li><strong>Prepare for outages.</strong> There are new limitations on communicating with a remote workforce.  Data collectors should consider what their business may look like if there is an international, national or local outage that would cut this limited access even further.</li>
</ul>
<ul>
<li><strong>Think about permanent solutions for the new workplace</strong>. The remote workforce will be able to return to their traditional workplaces at some point.  Data collectors should think about what safeguards should be put into place if workers start working remotely more frequently.</li>
</ul>
<p>Not surprisingly, we have already seen hackers target vital businesses that are essential during the coronavirus pandemic.  German newspapers have reported that “Cyber criminals have launched a distributed denial-of-service (DDoS) attack against German food delivery service Takeaway.com (Liefrando.de), demanding two bitcoins (about $11,000) to stop the flood of traffic.”  <a href="https://nationalcybersecurity.com/ddos-attack-targets-german-food-delivery-service/" target="_blank">Commentators warn this may not be the end of cyber attacks</a>:</p>
<p><em>Security experts anticipate these types of acts, intended to exploit essential services in times of crisis, will continue as restrictions due to COVID-19 remain in place. “Deplorably, we will likely see a further avalanche of cyberattacks targeting most susceptible online businesses,” says ImmuniWeb founder and CEO Ilia Kolochenko. As a result, many organizations may be forced to pay cybercriminals or invest in DDoS protection services to defend against advanced attacks.</em></p>
<p>Clearly, this will be a continuing threat over the next few weeks.</p>
<ol start="2">
<li><strong>The Pandemic May Cause Privacy Regulations To Get Dialed Back.</strong></li>
</ol>
<p>A couple of months ago, business, insurers and governments were starting to get the hang of this privacy thing.  Previously, the biggest concern was compliance with privacy regulations such as the California Consumer Privacy Act (“CCPA”).  (By the way, a number of organizations are now calling for the delay of the enforcement of the CCPA: <a href="https://www.ciodive.com/news/CCPA-coronavirus-extension/574547/">https://www.ciodive.com/news/CCPA-coronavirus-extension/574547/</a>)  That was, of course, until the coronavirus pandemic sent workers home.</p>
<p>Being just a few weeks into the pandemic, we can be sure that privacy law will be profoundly impacted when deadlines are extended and the data is used by millions of workers that have moved offsite.  After the pandemic, we will need to watch deadlines and be ready to modify compliance with privacy law.</p>
<p>If the adoption or enforcement of privacy regulations is delayed by the coronavirus pandemic, we may see data collectors struggle to find guidance for proper data and storage and collection.  Looking at case law may fill this void left by relaxed deadlines and requirements.  For example, data collectors may look to decisions such as the March 26, 2018 opinion in <em>Hopper v. Schletter Inc</em>., 17-cv-01, 2018 WL 1472485 (W.D. North Carolina 2018) as an example where a court was prepared to hold employers liable if they disclose their employees’ information by mistake. And, if courts around the country adopt the reasoning in <em>Hopper</em>, employers can expect to have their cyber security protocols closely scrutinized after the coronavirus pandemic.</p>
<p>Further, the facts giving rise to the incident in <em>Hopper</em> are instructive to remote workplaces.  On April 19, 2016, the defendant in <em>Hopper</em>, Schletter Group, sent a letter advising its employees and former employees that Schletter had sent its employees’ W-2 forms by mistake to a third-party after it fell prey to a phishing scam. Schletter offered credit monitoring and identity theft protection to those impacted. After the plaintiffs filed a lawsuit seeking alleged damages as a result of this incident, Schletter filed a motion to dismiss the complaint. The District Court denied Schletter’s motion to dismiss the plaintiffs’ claims for negligence and breach of implied contract, invasion of privacy and violations of North Carolina’s Unfair Trade Practices and Privacy Acts. The District Court, however, dismissed the breach of fiduciary duty claim.</p>
<p>As an initial step, the District Court discussed all the warnings it believed Schletter had about phishing scams before it fell prey. In finding Schletter had ample notice of the potential for an incident, the District Court listed various FBI warnings, IRS alerts, articles and examples available of emails used in similar scams that it believed Schletter should have been aware of before the incident. After discussing all the ways the District Court believed the Defendant should have been aware of this scam, the District Court stated that “[d]espite the widespread prevalence of spoofing aimed at obtaining confidential information from employers and despite the warnings of the 2016 tax season W-2 email scam, [Schletter] provided its employees with unreasonably deficient training on cyber security and information transfer protocols prior to the Data Disclosure.” The District Court called Schletter’s preparation and response into question.</p>
<p>The District Court provided the following examples of how it believed Schletter failed to properly train its employees:</p>
<ul>
<li>How to detect phishing and spoofing emails and other scams including providing employees examples of these scams and guidance on how to verify if emails are legitimate;</li>
<li>Effective password management and encryption protocols for internal and external emails;</li>
<li>Avoidance of responding to emails that are suspicious or from unknown sources;</li>
<li>Locking, encrypting and limiting access to computers and files containing sensitive information;</li>
<li>Implementing guidelines for maintaining and communicating sensitive data; and</li>
<li>Protecting sensitive employee information, including personal and financial information, by implementing protocols on how to request and respond to requests for the transfer of such information and how to securely send such information through a secure file transfer system to only known recipients.</li>
</ul>
<p>Based on this reasoning, the District Court concluded “[t]he Data Disclosure was caused by the Defendant’s failure to abide by best practices and industry standards concerning the security of its computer and payroll processing systems.” In further support of its conclusion, the District Court listed the various ways it found Schletter had failed to implement the proper security measures to protect the W-2s.</p>
<p>It will be interesting to see if courts are going to give data collectors a “pass” for lapses in cyber security once the coronavirus pandemic has come to an end.  Even though cyber security may be in flux, there is still a significant amount of guidance for data collectors.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/' data-emailit-title='Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/">Where Do We Begin? Two Immediate Threats to Cyber Security During the Coronavirus Pandemic</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cyber-security-during-coronavirus-pandemic/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases</title>
		<link>https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases</link>
		<comments>https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/#comments</comments>
		<pubDate>Mon, 01 Aug 2016 20:32:46 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber damages]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber litigation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[expert witness]]></category>
		<category><![CDATA[forensic accounting]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[testimony]]></category>
		<category><![CDATA[witness]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=877</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/' data-emailit-title='Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Although cyber litigation is still evolving, there has been little opportunity to consider the value of expert witnesses and consultants in these cases. However, as we begin to see more claims and litigation, there will be no question that expert... <a class="more-link" href="https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/' data-emailit-title='Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/">Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/' data-emailit-title='Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>Although cyber litigation is still evolving, there has been little opportunity to consider the value of expert witnesses and consultants in these cases. However, as we begin to see more claims and litigation, there will be no question that expert witness testimony and consultation will play a larger role in cyber security. Consequently, the evidentiary weight given to expert witness testimony and credibility related to cyber litigation will be a growing concern.</p>
<p>In particular, forensic accountants are expected to be called upon to quantify any alleged economic damages caused by a cyber incident. In the whitepaper, “<a href="http://www.hsno.com/forensic-accountants-and-cyber-breach">How Forensic Accountants Help In Cyber Breach Cases</a>,” published by the accounting firm HSNO, it states that a forensic accountant may look at documents including, but are not limited to: historical company performance, financial statements, forecasts or projections, interviews with company management, a review of the types of data lost or accessed and a review of laws and obligations following a breach.</p>
<p>In another recent report, “<a href="http://www.hsno.com/wp-content/uploads/2016/05/HSNO-Cyber-WhitePaper-Hagen.pdf?utm_medium=email&amp;sslid=szA2tjQyNDU3s7QEAA&amp;sseid=M7c0NTE2srQEAA&amp;jobid=a57bc67e-69b9-4026-8d9f-94e9cbfa550c">A Guide To Calculating Business Interruption Losses Related To Standalone Cyber Policies</a>,” HSNO addresses considerations to measure Business Interruption (BI) damages related to cyber incidents. In its report, HSNO defines BI as the amount equal to “the loss of net income plus continuing costs not earned.” In measuring BI, the HSNO whitepaper states its experience has indicated that “the top three measurement issues between claimed and calculated BI issues in order of frequency are: sales projections, period of indemnity and saved costs-ordinary payroll” for forensic accountants. The whitepaper analyzes measures for BI claims in the context of cyber claims in the following manner:</p>
<ul>
<li><em>Sales Projections:</em> In general, the first step in a forensic accountant’s calculation is to determine the “But For” sales, which analyzes the amount the sales would have been “but for” the particular event. In determining sales projections related to a cyber incident, the report explains that “forensic accountants will likely be looking at the entire company as opposed to just one particular location or region, which is usually the case with a fire or hurricane.” Further, these calculations may be further impacted when BI is being calculated for “a new business, a vastly changing market or a new product.” In order to limit the impact of these variables, the report recommends taking time to gather sufficient information to obtain “the ‘more correct’ projection.”</li>
<li><em>Period of Indemnity:</em> The Period of Indemnity is “the time period for which indemnity or compensation is payable under a business interruption policy.” Here, a forensic accountant can be used to determine the monetary amount of the damages for each day the breach caused a network to be down. However, an accounting expert would not be able to assist with the amount of time or number of days a computer network should reasonably be down. That is a determination to be made by a technical expert.</li>
<li><em>Saved Costs-Ordinary Payroll:</em> In the context of a cyber claim, saved (avoided) costs would be incurred for payroll, or if the targeted company decides to “pay non-productive employees during the outage period or have a layoff.”</li>
</ul>
<p>At present, studies have found that <a href="http://aon.mediaroom.com/news-releases?item=137400">BI related to cyber incidents is a top concern</a>, considering the potential for <a href="https://privacyriskreport.com/anatomy-of-a-cyber-fraud-incident-recent-fraud-impacts-companys-bottom-line-within-a-few-weeks/">lost revenue caused by ransomware or some other cyber incident</a>. As a result, expert opinions and testimony related to BI will become imperative for cyber claims in the near future.</p>
<p>It has been clear for some time that insurers, brokers, underwriters and policyholders all need to work together in order to get the full value out of cyber insurance. In the same manner, insurers, counsel and experts will need to coordinate efforts in order to properly value damages related to a cyber claim. While cyber incidents may cause damage differently than traditional perils, such as a hurricane, in the end, the BI damages will be calculated in the same manner.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/' data-emailit-title='Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/">Expert Witness Testimony Must Be Accounted for While Valuing Damages in Cyber Cases</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/expert-witness-testimony-must-be-accounted-for-while-valuing-damages-in-cyber-cases/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach</title>
		<link>https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach</link>
		<comments>https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/#comments</comments>
		<pubDate>Thu, 09 Jun 2016 17:50:18 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=783</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>In 2014, P.F. Chang’s experienced a credit card breach involving a number of its restaurants that culminated in numerous lawsuits nationwide. The ensuing litigation related to this data breach provided significant insight into what would become the important issues in data... <a class="more-link" href="https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/">The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>In 2014, P.F. Chang’s experienced a credit card breach involving a number of its restaurants that culminated in numerous lawsuits nationwide. The ensuing litigation related to this data breach provided significant insight into what would become the important issues in data breach litigation moving forward. For example, the <a href="https://privacyriskreport.com/p-f-changs-decision-establishes-7th-circuit-as-friendly-territory-for-data-breach-plaintiffs/">7th Circuit U.S. Court of Appeals held the class representatives’ allegations</a> of fraudulent credit card charges, credit monitoring costs and potential identity theft were sufficient to establish standing to bring suit against P.F. Chang’s for this data breach.</p>
<p>The impact of P.F. Chang’s data breach on insurance coverage law is becoming apparent two years after the breach and as class action plaintiffs are beginning to prosecute their cases. For instance, on May 31, 2016, in <em><a href="https://privacyriskreport.com/wp-content/uploads/2016/06/PFChangs_v_Federal.pdf" target="_blank">P.F. Chang’s China Bistro, Inc. v. Federal Ins. Co.</a></em>, a federal District Court in Arizona issued an order granting Federal Insurance Company’s motion for summary judgment, finding there was no coverage under a cyber policy for P.F. Chang’s breach. The <em>P.F. Chang&#8217;s</em> court stated the central issue in its coverage determination as:  “…whether coverage exists under the insurance policy between Chang’s and Federal for the credit card association assessments that arose from the data breach Chang’s suffered….”</p>
<p>Prior to its analysis of the coverage issues, the order granting summary judgment provides the following background related to P.F. Chang’s claim under the Federal Policy:</p>
<ul>
<li>Federal issued a cyber policy to P.F. Chang’s, effective January 1, 2014, to January 1, 2015.</li>
<li>P.F. Chang’s, as with many merchants, cannot process credit card transactions themselves and, therefore, used “Servicers” who process the transactions with banks that issue the credit cards (Issuers). P.F. Chang’s entered into an agreement with Bank of America (BoA) to process these transactions.</li>
<li>Servicers such as BoA process these transactions and, in turn, must enter into agreements with credit card companies that obligate BoA and banks acting as Issuers to pay fees and assessments to credit card companies if there is a breach.</li>
<li>Under P.F. Chang’s agreement with BoA, P.F. Chang&#8217;s agreed to reimburse BoA for any fees and assessments it was required to pay credit card companies for P.F. Chang’s breach.</li>
<li>After the breach, Federal reimbursed P.F. Chang’s approximately $1.7 million for costs related to forensic investigations and defense of claims arising out of the breach.</li>
</ul>
<p>BoA also sought nearly $2 million in fees and assessments from P.F. Chang’s for amounts it incurred from its agreements with the credit card companies pursuant to P.F. Chang&#8217;s reimbursement agreement with BoA. P.F. Chang’s reimbursed BoA and then sought to recover this amount from Federal under its cyber policy. P.F. Chang&#8217;s initiated this litigation when Federal denied coverage for these amounts. P.F. Chang’s sought coverage under both Insuring Clause A and Insuring Clause B of the cyber policy. The court granted Federal’s motion for summary judgment finding no coverage under either Insuring Clause based on the following reasoning:</p>
<ul>
<li><strong>No Coverage Under Insuring Clause A</strong>: Under the Federal Policy, Insuring Clause A provided that, “[Federal] shall pay for <strong>Loss</strong> on behalf of an <strong>Insured </strong>on account of any <strong>Claim </strong>first made against such <strong>Insured </strong>. . . for <strong>Injury</strong>.” Injury is further defined under the cyber policy to include “Privacy Injury” which “means injury sustained or allegedly sustained by a <strong>Person </strong>because of actual or potential unauthorized access to such <strong>Person’s Record</strong>, or exceeding access to such <strong>Person’s Record</strong>.” The Federal Policy also defines “<strong>Record</strong>” as “any information concerning a natural person that is defined as: (i) private personal information; (ii) personally identifiable information&#8230;pursuant to any federal, state&#8230;statute or regulation,&#8230;where such information is held by an <strong>Insured Organization </strong>or on the <strong>Insured Organization’s </strong>behalf by a <strong>Third Party Service Provider</strong>” or “an organization’s non-public information that is&#8230;in an <strong>Insured’s </strong>or <strong>Third Party Service Provider’s </strong>care, custody, or control.” The court agreed with Federal’s argument on this point that P.F. Chang’s was not entitled to coverage under Insuring Clause A because BoA itself did not sustain a privacy injury because its records were not compromised during the data breach.</li>
<li><strong>There May Be Coverage Under Insuring Clause B: </strong>Under the Federal Policy, Insuring Clause B provides that “[Federal] shall pay Privacy Notification Expenses incurred by an Insured resulting from [Privacy] Injury.” The court agreed with P.F. Chang’s argument that it was entitled to coverage under this provision because of the amounts P.F. Chang’s paid Issuers to reissue bankcards and new account numbers. Even though these fees and assessments may have been incurred by BoA, the court found it persuasive that P.F. Chang’s was ultimately responsible to pay these amounts under its contracts with BoA.</li>
<li><strong>Policy Exclusions Bar Coverage</strong>: Even if there was coverage under Insuring Clause B, the court held two exclusions in the Federal Policy would bar coverage for any contractual obligations P.F. Chang’s assumed from a third party. Specifically, the court agreed with Federal’s argument that the fees and assessments P.F. Chang’s assumed in its contract with BoA were excluded from coverage.</li>
</ul>
<p>As seen on prior occasions, the court’s coverage determination went back to <a href="https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/">basic coverage law</a>. In the <em>P.F. Chang’s </em>decision, the court discusses its reliance on existing coverage law: “In reaching this decision, the court turned to cases analyzing commercial general liability insurance policies for guidance, because cybersecurity insurance policies are relatively new to the market but the fundamental principles are the same.”</p>
<p>It is important to note that Federal paid approximately $1.7 million for P.F. Chang’s damages related to forensic investigations and defense costs. These damages were not at issue under the cyber insurance policy. In short, the cyber policy worked exactly as it was intended to work when there was a data breach. While struggling with the more difficult question (whether the costs P.F. Chang’s became responsible for in its contract with BoA), the court went back to fundamental insurance concepts to find cyber coverage was barred by exclusions for liability assumed from a third party. Therefore, while this decision provides guidance on how courts may be expected to interpret the specific language of a cyber policy, it also demonstrates the importance of the existing body of law related to CGL coverage.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/' data-emailit-title='The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/">The Future Is Now: Court Finds No Coverage Under Cyber Policy for P.F. Chang’s Data Breach</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/the-future-is-now-court-finds-no-coverage-under-cyber-policy-for-p-f-changs-data-breach/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case</title>
		<link>https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case</link>
		<comments>https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/#comments</comments>
		<pubDate>Tue, 24 May 2016 20:23:17 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[damages]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[first party property]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[property line]]></category>
		<category><![CDATA[property lines]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=756</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/' data-emailit-title='Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On May 20, 2016, the U.S. Court of Appeals for the 8th Circuit affirmed a District Court decision finding coverage for a loss under a financial institution bond issued by BancInsure, Inc. (BancInsure) to the State Bank of Bellingham (Bellingham).... <a class="more-link" href="https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/' data-emailit-title='Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/">Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/' data-emailit-title='Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On May 20, 2016, the <a href="https://privacyriskreport.com/wp-content/uploads/2016/05/Bellingham_v_BancInsure_05202016.pdf">U.S. Court of Appeals for the 8th Circuit affirmed a District Court decision</a> finding coverage for a loss under a financial institution bond issued by BancInsure, Inc. (BancInsure) to the State Bank of Bellingham (Bellingham). Bellingham made a claim under the bond when one of its computers became infected with malware that allowed criminals to transfer $485,000 held at Bellingham to an account at a foreign bank. By the time the illegal transfer was discovered, the funds were not recoverable. The District Court granted Bellingham’s motion for summary judgment finding coverage under the financial bond.</p>
<p>Before reaching its decision, the 8th Circuit examined the “concurrent-causation doctrine” as adopted under Minnesota law, which holds that “[a]n insured is entitled to recover from an insurer when the cause of the loss is not excluded under the policy. This is true even though an excluded cause may have contributed to the loss.” In its decision, the 8th Circuit applied Minnesota’s concurrent-causation doctrine as follows:</p>
<p style="padding-left: 30px;"><em>[W]here an excluded peril “contributed to the loss,” an insured may recover if a peril is… “the efficient and proximate cause” of the loss.  Conversely, it follows that if an excluded peril is the efficient and proximate cause of the loss, the coverage is excluded.  An “efficient and proximate cause,” in other words, is an “overriding cause.” </em></p>
<p>BancInsure first argued that the concurrent-causation doctrine does not apply to financial institution bonds. Specifically, BancInsure took the position that “despite the general applicability of the concurrent-causation doctrine to Minnesota insurance contracts, the doctrine is not similarly applicable to financial institution bonds because a financial institution bond requires the insured initially show that its loss directly and immediately resulted from dishonest, criminal, or malicious conduct.” In rejecting BancInsure’s argument, the 8th Circuit found “[n]o Minnesota case precludes application of the concurrent-causation doctrine to financial institution bonds.” Therefore, under Minnesota law, the 8th Circuit found no reason to treat financial bonds differently than any other insurance contract.</p>
<p>Next, BancInsure asserted the language in the bond “contracted around the doctrine.” In an argument relying heavily on the exclusions in the bond, BancInsure argued the policy language was intended to “contract[] around the concurrent-causation doctrine because [the] exclusions also apply to ‘indirect’ causation.” The 8th Circuit held the provisions BancInsure relied on for this argument were not sufficiently direct to get around the concurrent-causation doctrine. In acknowledging parties can contract around the doctrine, the 8th Circuit held that Minnesota law requires such language to be “clear and specific.” The court held there was no provision that was sufficiently clear or specific in the bond at issue in this case.</p>
<p>Finally, BancInsure claimed the trial court incorrectly held hacking by a criminal third party into the bank’s computer system was the overriding or efficient and proximate cause of the loss. Rather, BancInsure argues this question should have been resolved by a jury. In rejecting BancInsure’s argument, the 8th Circuit relied on its decision in <em>Friedberg v. Chubb &amp; Son, Inc.</em>, where Minnesota’s concurrent-causation doctrine was closely examined in a first-party property case where the insureds’ home suffered extensive water damage. During an investigation of the water intrusion, it was determined that defective construction of the home caused the water damage. In finding the policy in <em>Friedberg</em> did not provide coverage, the 8th Circuit held that “although the water intrusion played an essential role in the damage to the [] house, it was a foreseeable and natural consequence that water would enter.”</p>
<p>Based on the reasoning in <em>Friedberg</em>, the 8th Circuit held the trial court correctly opined that “the efficient and proximate cause of the loss in this situation was the illegal transfer of the money and not the employees’ violations of policies and procedures.” Specifically, the court held that “[u]nlike the water damage in Friedberg, an illegal wire transfer is not a ‘foreseeable and natural consequence’ of the bank employees’ failure to follow proper computer security policies, procedures, and protocols.” That is, even if the employee’s actions are found to have played an essential role in a virus attacking the bank’s system, “the intrusion and the ensuing loss…suffered remains the criminal activity of a third party.”</p>
<p>This decision demonstrates that courts are going to go back to the well-established concepts even when technology gives rises to new factual backgrounds and circumstances. For example, in this decision, the court goes back to fundamental first-party insurance concepts with the concurrent-causation doctrine. Consequently, while the facts are unique with technology, hacking and cyber claims, we can expect courts to first look to establish law to solve coverage issues.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/' data-emailit-title='Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/">Something Old, Something New: Well-Established First-Party Property Concepts Used in Computer Hacking Coverage Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/something-old-something-new-well-established-first-party-property-concepts-used-in-computer-hacking-coverage-case/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Law Firms&#8217; Work Product Has No Privileges Against Hackers</title>
		<link>https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=law-firms-work-product-has-no-privileges-against-hackers</link>
		<comments>https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/#comments</comments>
		<pubDate>Mon, 25 Apr 2016 20:37:14 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber liability]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[law firm]]></category>
		<category><![CDATA[law firms]]></category>
		<category><![CDATA[panama papers]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=706</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>It appears that large retailers and hospitals are no longer the only targets for hackers as evidenced by the hack at the Panamanian law firm, Mossack Fonseca, generally referred to as the “Panama Papers.” While the identity of the hackers is... <a class="more-link" href="https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/">Law Firms&#8217; Work Product Has No Privileges Against Hackers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>It appears that large retailers and hospitals are no longer the only targets for hackers as evidenced by the hack at the Panamanian law firm, Mossack Fonseca, generally referred to as the “<span style="color: #1f497d;"><a href="http://www.forbes.com/sites#/sites/luisakroll/2016/04/03/billionaires-former-billionaires-outed-for-offshore-wealth-by-the-panama-papers/">Panama Papers</a>.</span>” While the identity of the hackers is still unknown, the extent of these crimes is starting to be fully realized. Reports <a href="http://www.forbes.com/sites/jasonbloomberg/2016/04/21/cybersecurity-lessons-learned-from-panama-papers-breach/" target="_blank">indicate the hackers took millions of documents,</a> including emails belonging to the law firm’s clients. There has already been substantial fallout from this hack including the <a href="http://www.usatoday.com/story/news/world/2016/04/05/panama-papers-icelands-leader-may-ready-resign/82645064/" target="_blank">resignation of Iceland<span style="color: #1f497d;">’</span>s prime minister </a>and <a href="http://www.reuters.com/article/us-pakistan-politics-idUSKCN0XL0A0">uncertainty for a number of other world leaders</a>.</p>
<p>Perhaps the most startling fact about this crime is the lack of sophistication needed to steal sensitive client information. The combination of outdated safeguards and highly-sensitive information provide<span style="color: #1f497d;">s</span> a ripe target for hackers. Specifically, commentators believe this attack originated when the law firm failed to update its web servers:</p>
<p style="margin-left: .5in;"><em>The fact that Mossack Fonseca’s web servers were many months out of date was particularly egregious, especially considering the sensitivity of their clients’ information. “They seem to have been caught in a time warp,”</em> <em>says Alan Woodward, a cybersecurity expert from University of Surrey and consultant to Europol’s European Cybercrime Centre. “If I were a client of theirs I’d be very concerned that they were communicating using such outdated technology.”</em></p>
<p>In addition to the “Panama Papers” incident, there should be little question law firms hackers are looking to exploit vulnerability at law firms. It has recently come to light that <a href="http://www.abajournal.com/news/article/posts_on_cyber_criminal_forum_outline_plans_for_law_firm_hack_attacks_seeki" target="_blank">hackers have launched “phishing” attacks </a>aimed at law firm employees and personnel. In an attempt to gain access to documents related to corporate mergers, authorities recently learned of a scheme offering to pay hackers $100,000 in addition to half the profits of the first $1 million taken from law firms. In particular, after gaining access to law firm networks, the hackers were instructed to conduct key word searches to find documents related to pending mergers or other transactions that the hackers could use to turn a profit.</p>
<p>In response to this scheme, the <a href="http://www.americanbar.org/groups/leadership/office_of_the_president/cybersecurity.html" target="_blank">FBI recently issued an alert through the American Bar Association </a>warning law firms of this threat. The FBI alert describes the scheme as follows:</p>
<p style="margin-left: .5in;"><em>A financially motivated cyber crime insider trading scheme targets international law firm information used to facilitate business ventures. The scheme involves a hacker compromising the law firm’s computer networks and monitoring them for material, non-public information (MNPI). This information, gained prior to a public announcement, is then used by a criminal with international stock market expertise to strategically place bids and generate a monetary profit.</em></p>
<p>The evolution of the hacker threat from large (highly secured) targets to smaller (lacking security) targets has not been a surprise. What has been surprising is the fact that the smaller targets did not see the threat evolve to put them in the crosshairs. Further, the fact that a number of international law firms have found themselves to be targets demonstrates difficulties in protecting against hackers. The threat to law firms should also provide insight to accounting firms, real estate brokers and any other smaller operation about the value of cyber security.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/' data-emailit-title='Law Firms&#8217; Work Product Has No Privileges Against Hackers'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/">Law Firms&#8217; Work Product Has No Privileges Against Hackers</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/law-firms-work-product-has-no-privileges-against-hackers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?</title>
		<link>https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims</link>
		<comments>https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/#comments</comments>
		<pubDate>Tue, 12 Apr 2016 15:29:12 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[CGL]]></category>
		<category><![CDATA[class action]]></category>
		<category><![CDATA[commercial general liability]]></category>
		<category><![CDATA[coverage]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber claims]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[litigation]]></category>
		<category><![CDATA[medical records]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[portal]]></category>
		<category><![CDATA[portal healthcare]]></category>
		<category><![CDATA[Sony]]></category>
		<category><![CDATA[Target]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=685</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>Over the last couple of years, courts have struggled with whether cyber claims could trigger coverage under commercial general liability (CGL) insurance policies. While courts have found most cyber claims will not be covered as “bodily injury” or “property damage”... <a class="more-link" href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/">Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p><span style="color: #000000;">Over the last couple of years, courts have struggled with whether cyber claims could trigger coverage under commercial general liability (CGL) insurance policies. While courts have found most cyber claims will not be covered as “bodily injury” or “property damage” under the typical CGL policy, some courts have struggled with whether cyber claims constitute “publication” under the advertising and personal injury coverage of a typical CGL policy.</span></p>
<p><span style="color: #000000;"><em><b>Travelers Indemnity Co. v. Portal Healthcare</b></em><strong> Decision</strong></span></p>
<p><span style="color: #000000;">On April 11, 2016, the 4th U.S. Circuit Court of Appeals issued its unpublished decision in</span> <a href="https://privacyriskreport.com/wp-content/uploads/2016/04/Travelers-Indemnity-Co.-of-America-v.-Portal-Healthcare-Solutions-L.L.C..pdf" target="_blank"><em>Travelers Indemnity Co. of America v. Portal Healthcare Solutions, L.L.C</em>.</a> <span style="color: #000000;">In <em>Portal</em>, the 4th Circuit held medical records posted on the Internet could potentially give rise to coverage under a CGL policy.</span></p>
<p><span style="color: #000000;">This coverage action originates with a class action complaint filed against Travelers’ insured, Portal, alleging that Portal’s conduct resulted in the underlying plaintiffs’ medical records being posted on the Internet for more than four months. Travelers initiated the declaratory judgment action seeking a determination that there was no coverage for the class action complaint under two CGL policies it issued to Portal.</span></p>
<p><span style="color: #000000;">In affirming the decision by the U.S. District Court for the Eastern District of Virginia, the 4th Circuit held “that the class-action complaint ‘at least potentially or arguably’ alleges a ‘publication’ of private medical information by Portal that constitutes conduct covered under the Policies.” The 4th Circuit further held “[s]uch conduct, if proven, would have given ‘unreasonable publicity to and disclose[d] information about patients’ private lives,’ because any member of the public with an Internet connection could have viewed the plaintiffs’ private medical records during the time the records were available online.”</span></p>
<p><span style="color: #000000;">Based on this reasoning, the 4th Circuit held Travelers had a duty to defend Portal in the class action. This decision highlights the importance of what happens to the sensitive information and whether there is a “publication” as that term is defined under the typical CGL policy.</span></p>
<p><span style="color: #000000;"><strong>Putting the </strong><em><b>Portal</b></em><strong> Decision in Context</strong></span></p>
<p><span style="color: #000000;">In contrast, on May 18, 2015, the Connecticut Supreme Court affirmed a lower court’s decision finding there was no insurance coverage for more than $6 million in losses related to the exposure of private information belonging to nearly 500,000 IBM employees. In</span> <a href="http://www.jud.ct.gov/external/supapp/Cases/AROcr/CR317/317CR54.pdf"><em>Recall Total Info. Management, Inc. v. Federal Ins. Co</em>.</a><span style="color: #000000;">, the insured sought coverage under its CGL policy when it <a style="color: #000000;" href="https://privacyriskreport.com/connecticut-supreme-court-finds-no-coverage-under-cgl-policy-for-lost-data/" target="_blank">lost data storage tapes</a> storing its customer’s private information. The tapes fell off the back of the insured’s van and it was believed that about 130 of the tapes were taken from the road by an unknown person. The CGL policy at issue provided coverage for “personal injury” which included “publication of material that…violates a person’s right to privacy.”</span></p>
<p><span style="color: #000000;">In analyzing this provision and the facts of this case, the <em>Recall Total</em> court first held there was no dispute that the information on the tapes was private, and, second, that the threshold was whether the information on the tapes had been “published.” In finding there was no coverage, the lower court held there was no evidence that the information on the tapes had been found or used after the tapes fell off the van. In reviewing the evidence, the Court found “[t]here is nothing in the record suggesting that the information on the tapes was ever accessed by anyone.” Specifically, the <em>Recall Total</em> lower court decision addressed the personal injury provision in the following manner:</span></p>
<p style="padding-left: 30px;"><span style="color: #000000;"><em>On the basis of our review of the policy, we conclude that personal injury presupposes publication of the personal information contained on the tapes. Thus, the dispositive issue is not loss of the physical tapes themselves; rather, it is whether the information in them has been published. The plaintiffs contend that the mere loss of the tapes constitutes a publication, and has alleged that the information was published to a thief. The plaintiffs have failed to cite any evidence that the information was published and thereby failed to take their allegation beyond the realm of speculation. See, e.g., Norse Systems, Inc. v. Tingley Systems, Inc., supra, 49 Conn.App. at 591, 715 A.2d 807 (speculation or conjecture will not overcome motion for summary judgment). As the complaint and affidavits are entirely devoid of facts suggesting that the personal information actually was accessed, there has been no publication.</em></span></p>
<p><span style="color: #000000;">In its concise decision, the Connecticut Supreme Court said there was no purpose in repeating the discussion in the superior court’s “well-reasoned”</span> <a href="http://www.leagle.com/decision/In%20CTCO%2020140114064/RECALL%20TOTAL%20INFORMATION%20v.%20FEDERAL%20INS." target="_blank">January 2014 ruling</a>.</p>
<p><span style="color: #000000;">While these decisions may arguably not involve a data breach or a classic cyber claim, many commentators believed that the <em>Recall Total</em> court’s reasoning would shed light on how data breach might be viewed from a coverage perspective when there is no evidence that the private or confidential information was actually published to third parties.</span></p>
<p><span style="color: #000000;"><strong>Portal’s Contribution to Current State of the Law</strong></span></p>
<p><span style="color: #000000;">Undoubtedly, the <em>Portal </em>decision provides significant guidance on the issue of whether data breaches will be covered under traditional CGL policies. Prior to this decision, the body of law was limited to the reasoning of the <em>Recall Total</em> decision, which was in harmony with the trial court’s decision in Sony’s coverage action against Zurich.</span> <a href="https://privacyriskreport.com/sony-and-zurich-settle-data-breach-case-before-appellate-court-can-decide-coverage-issues-under-cgl-policy/" target="_blank">In the <i>Sony</i> case</a><span style="color: #000000;">, which was settled before the appellate court could render its decision, the New York trial court ruled Zurich had no duty to defend because there was no “publication” under Coverage B of the CGL policy.</span></p>
<p><span style="color: #000000;">When the dust settles, we may see that the <em>Portal </em>decision has little impact with extent to medical records placed on the internet. Not all cyber claims result in information or data posted on the Internet, or in another manner, to third parties. Rather, many cyber claims involve information being taken and used for criminal acts. That is, a court may not find the information taken in the</span> <a href="https://privacyriskreport.com/target-and-consumer-plaintiffs-nearing-settlement-of-class-action-suit-related-to-2013-data-breach/" target="_blank">Target breach (credit card information stolen)</a> <span style="color: #000000;">or similar cyber incidents includes this “publication” element required to trigger CGL coverage.</span></p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/' data-emailit-title='Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/">Early Observations in Portal Healthcare Decision: CGL Coverage for Cyber Claims?</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/early-observations-in-portal-healthcare-decision-cgl-coverage-for-cyber-claims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
