SlideShare a Scribd company logo
1 of 22
Download to read offline
1
In today’s media and technology age, website owners, designers, hosts and Internet Service providers are presented with
multiple risks with regard to business and cyberspace. E-commerce now comprises approximately one-third of all the
business conducted on the Internet according to the Insurance Journal. Further, in 1999, businesses lost more than $20
billion because of power outages and hackers. Therefore, protection for your Internet-based resources must be a top
priority.




                                                                                                                          2
Since Internet commerce and use of the Internet in business settings for employees is prevalent and continues to grow in
popularity, insurance coverage is now offered to protect companies from exposures. These policies are incredibly
important because traditional insurance does not cover losses via the World Wide Web. In fact, these new digital risk
policies are just as important as specific policies for cars and homes. For instance, if you are store owner and someone
breaks in and physically damages several of your computers, your property coverage will cover the damages. However, if
someone from a distant location manipulates your firewall protection and gains remote access to your server and then
deletes and alters your data, you are not covered under general liability or property damage insurance. They simply do not
cover this type of activity, though some may argue that data is considered a form of “property.”




                                                                                                                             3
There are also risks associated with employee usage of the Internet and e-mail while on company time or using company-
owned programs.




                                                                                                                         4
Many times employees will feel as if their privacy was violated if they come to find out that their employer read their e-
mails or looked through information in files they felt were personal. The court will generally first determine if the
employee had a reasonable expectation that the information was in deed private, and then whether the employer’s actions
were warranted or unnecessary. If the employer has a clause in their company handbook outlining Internet and e-mail
usage, and employees acknowledge receipt and understanding of that policy, then the employee does not have a case for
privacy infringement. However, if these handbook policies are not put into place, then the employer can be found
negligent for enacting the proper precautions for its employees.


Companies may also wish to purchase Internet usage software to monitor employee conduct and detect inappropriate e-
mails and Internet usage. By using these programs, the company is establishing a balance between the privacy rights of
employees and the employer’s need to protect themselves from liability.




                                                                                                                             5
Claims of discrimination and harassment generally come as part of a hostile work environment claim in which an
employee accuses another of conduct that is unwelcome.




                                                                                                                 6
There are several other exposures that companies should be aware of if they have dealings on the Internet or via e-mail.
Potential risks can dramatically affect one’s bottom line and devastate a business without precautions set into place. Here
are the potential economy exposures.




                                                                                                                              7
Here are some ways in which individuals or entities can violate others with regard to trademarked data property.




                                                                                                                   8
Companies are being sued for copyright infringement more than ever because of the web-based usage of material that is
registered. There are other risks that reside within the company such as an employee misappropriating a company’s trade
secrets through e-mail, Internet bulletin board, blog posting or simply deleting them all together from the company
system.




                                                                                                                          9
Intellectual property disputes are also one of the risks of using the Internet to conduct business. Multiple companies may
go through battle regarding ownership of content and licensing. Furthermore, website owners are liable for the content
they place on their sites. These violations will continue to grow as it becomes easier to infringe on the property rights of
others online.




                                                                                                                               10
As websites gather information about visitors, whether it is credit card information or other important data, those who own
the site are at risk of liability if accidentally or through employee misconduct, security is breached. This can happen within
or even through a third party hacking into the company’s system. To combat these issues, site owners may wish to post a
privacy policy and abide by it concerning private information. Furthermore, they can transfer their liability to a third party
vendor that runs a secure website. In addition, the site controller can place unauthorized access controls forbidding those
without strict security access to enter and infringe on any part of the site.




                                                                                                                                 11
Businesses using computers to interact with clients may also experience breaches to their security systems and virus
attacks. One of the most notable viruses that devastated many companies was the “I LOVE YOU” virus that hit in May of
2000. This virus had dramatic impacts and caused many to lose a significant amount of revenue. In addition, if your site is
providing a service to another company and it malfunctions, you could cause that third party to lose business or not be
able to collect information that is crucial for their functions.




                                                                                                                              12
Companies with these types of posting capabilities allow individuals to talk with one another quickly via the Internet,
however there are liabilities involved with this function as well. Should one of your employees post defamatory
information about a client, another employee or the company, this could be devastating to your business.




                                                                                                                          13
Cyberliability insurance protection is a solid way to protect your electronic property from the aforementioned risks. The
policies covered under the guise of cyberliability include any company with a web presence or business that performs e-
commerce activities. The coverage include intangible economic losses such as those listed on the slide.




                                                                                                                            14
Internet Liability coverage covers the following infractions. Also includes computer virus transmission, unauthorized
access or use, loss of service and threats to damage or misuse another entity’s system, data or website.




                                                                                                                        15
Coverage includes the following items listed on the slide.




                                                             16
17
Explain to your client the different features offered from the various carriers available through your agency. Since these
coverages vary from carrier to carrier, this slide and its content should be modified to suit the products you sell.




                                                                                                                             18
This slide should also reflect the specific coverages you offer based on the carrier’s exclusions to the policies. Modify
based on the exclusions present within the coverages you are trying to sell to your clients, as exclusions vary by policy.
These specialty policies are designed to combat the exclusions that are present in a CGL policy.




                                                                                                                             19
20
Take an opportunity to share your personal experiences with cyberliability.




                                                                              21
22

More Related Content

What's hot

Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Actiance enabling social_networks
Actiance enabling  social_networksActiance enabling  social_networks
Actiance enabling social_networksDavid ChoActiance
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Business Development Institute
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 

What's hot (19)

Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Actiance enabling social_networks
Actiance enabling  social_networksActiance enabling  social_networks
Actiance enabling social_networks
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
 
Cybertorts
CybertortsCybertorts
Cybertorts
 

Viewers also liked

Perkembangan
PerkembanganPerkembangan
PerkembanganInstansi
 
Symptoms of a Billing and Payment Problem
Symptoms of a Billing and Payment ProblemSymptoms of a Billing and Payment Problem
Symptoms of a Billing and Payment ProblemMulti Service
 
Understanding the Value of a Payments Problem
Understanding the Value of a Payments ProblemUnderstanding the Value of a Payments Problem
Understanding the Value of a Payments ProblemMulti Service
 
3. yayasan kehati
3. yayasan kehati3. yayasan kehati
3. yayasan kehatiInstansi
 
Moments in Life (with help from Jane Seabrook
Moments in Life (with help from Jane SeabrookMoments in Life (with help from Jane Seabrook
Moments in Life (with help from Jane SeabrookKaron Graham
 
實驗流程說明
實驗流程說明實驗流程說明
實驗流程說明locationc
 
Parents: Facebook and You
Parents: Facebook and YouParents: Facebook and You
Parents: Facebook and YouJeff Pemberton
 
ABC Breakfast Club m. Abena: 40% færre restordre
ABC Breakfast Club m. Abena: 40% færre restordreABC Breakfast Club m. Abena: 40% færre restordre
ABC Breakfast Club m. Abena: 40% færre restordreABC Softwork
 
ABC Breakfast Club m DanZafe: Effektiv lageroprydning
ABC Breakfast Club m DanZafe: Effektiv lageroprydningABC Breakfast Club m DanZafe: Effektiv lageroprydning
ABC Breakfast Club m DanZafe: Effektiv lageroprydningABC Softwork
 
Big Data Engineering - Top 10 Pragmatics
Big Data Engineering - Top 10 PragmaticsBig Data Engineering - Top 10 Pragmatics
Big Data Engineering - Top 10 PragmaticsKrishna Sankar
 
Dohár péter kis angol nyeltvan
 Dohár péter   kis angol nyeltvan Dohár péter   kis angol nyeltvan
Dohár péter kis angol nyeltvangueste5dc69
 
Holiday in orlando
Holiday in orlandoHoliday in orlando
Holiday in orlandoguest2e8cac
 
Final week wei
Final week weiFinal week wei
Final week weiXiaoyin
 
Uppgift 7 mfo_1_dv009_vt2011
Uppgift 7 mfo_1_dv009_vt2011Uppgift 7 mfo_1_dv009_vt2011
Uppgift 7 mfo_1_dv009_vt2011mickef
 
민변 유권자를 위한 응급처치 선거법
민변 유권자를 위한 응급처치 선거법민변 유권자를 위한 응급처치 선거법
민변 유권자를 위한 응급처치 선거법karyui
 

Viewers also liked (18)

Puntosmetodo
PuntosmetodoPuntosmetodo
Puntosmetodo
 
Perkembangan
PerkembanganPerkembangan
Perkembangan
 
Symptoms of a Billing and Payment Problem
Symptoms of a Billing and Payment ProblemSymptoms of a Billing and Payment Problem
Symptoms of a Billing and Payment Problem
 
Understanding the Value of a Payments Problem
Understanding the Value of a Payments ProblemUnderstanding the Value of a Payments Problem
Understanding the Value of a Payments Problem
 
Ensayo
EnsayoEnsayo
Ensayo
 
V
VV
V
 
3. yayasan kehati
3. yayasan kehati3. yayasan kehati
3. yayasan kehati
 
Moments in Life (with help from Jane Seabrook
Moments in Life (with help from Jane SeabrookMoments in Life (with help from Jane Seabrook
Moments in Life (with help from Jane Seabrook
 
實驗流程說明
實驗流程說明實驗流程說明
實驗流程說明
 
Parents: Facebook and You
Parents: Facebook and YouParents: Facebook and You
Parents: Facebook and You
 
ABC Breakfast Club m. Abena: 40% færre restordre
ABC Breakfast Club m. Abena: 40% færre restordreABC Breakfast Club m. Abena: 40% færre restordre
ABC Breakfast Club m. Abena: 40% færre restordre
 
ABC Breakfast Club m DanZafe: Effektiv lageroprydning
ABC Breakfast Club m DanZafe: Effektiv lageroprydningABC Breakfast Club m DanZafe: Effektiv lageroprydning
ABC Breakfast Club m DanZafe: Effektiv lageroprydning
 
Big Data Engineering - Top 10 Pragmatics
Big Data Engineering - Top 10 PragmaticsBig Data Engineering - Top 10 Pragmatics
Big Data Engineering - Top 10 Pragmatics
 
Dohár péter kis angol nyeltvan
 Dohár péter   kis angol nyeltvan Dohár péter   kis angol nyeltvan
Dohár péter kis angol nyeltvan
 
Holiday in orlando
Holiday in orlandoHoliday in orlando
Holiday in orlando
 
Final week wei
Final week weiFinal week wei
Final week wei
 
Uppgift 7 mfo_1_dv009_vt2011
Uppgift 7 mfo_1_dv009_vt2011Uppgift 7 mfo_1_dv009_vt2011
Uppgift 7 mfo_1_dv009_vt2011
 
민변 유권자를 위한 응급처치 선거법
민변 유권자를 위한 응급처치 선거법민변 유권자를 위한 응급처치 선거법
민변 유권자를 위한 응급처치 선거법
 

Similar to Cyber liabilty

Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential InformationKim Jensen
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And KeyYarko Petriw
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksDavid Chase
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesRichard Rendell
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfBytecode Security
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023basilmph
 

Similar to Cyber liabilty (20)

Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial Risks
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web Services
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdf
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023
 
Data security
 Data security  Data security
Data security
 

More from Maran Corporate Risk Associates, Inc. (9)

Lateclaim
LateclaimLateclaim
Lateclaim
 
Aetna Health Care Timeline
Aetna Health Care TimelineAetna Health Care Timeline
Aetna Health Care Timeline
 
Kids to College WSJ Article
Kids to College WSJ ArticleKids to College WSJ Article
Kids to College WSJ Article
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Tax Efficient Investing Workshop
Tax Efficient Investing Workshop Tax Efficient Investing Workshop
Tax Efficient Investing Workshop
 
Flood insurance gets harder to find wsj.com
Flood insurance gets harder to find   wsj.comFlood insurance gets harder to find   wsj.com
Flood insurance gets harder to find wsj.com
 
Preparing for a hurricane
Preparing for a hurricanePreparing for a hurricane
Preparing for a hurricane
 
Hurricane preparedness white paper
Hurricane preparedness white paperHurricane preparedness white paper
Hurricane preparedness white paper
 
What Real People Say
What Real People Say What Real People Say
What Real People Say
 

Recently uploaded

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 

Recently uploaded (20)

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 

Cyber liabilty

  • 1. 1
  • 2. In today’s media and technology age, website owners, designers, hosts and Internet Service providers are presented with multiple risks with regard to business and cyberspace. E-commerce now comprises approximately one-third of all the business conducted on the Internet according to the Insurance Journal. Further, in 1999, businesses lost more than $20 billion because of power outages and hackers. Therefore, protection for your Internet-based resources must be a top priority. 2
  • 3. Since Internet commerce and use of the Internet in business settings for employees is prevalent and continues to grow in popularity, insurance coverage is now offered to protect companies from exposures. These policies are incredibly important because traditional insurance does not cover losses via the World Wide Web. In fact, these new digital risk policies are just as important as specific policies for cars and homes. For instance, if you are store owner and someone breaks in and physically damages several of your computers, your property coverage will cover the damages. However, if someone from a distant location manipulates your firewall protection and gains remote access to your server and then deletes and alters your data, you are not covered under general liability or property damage insurance. They simply do not cover this type of activity, though some may argue that data is considered a form of “property.” 3
  • 4. There are also risks associated with employee usage of the Internet and e-mail while on company time or using company- owned programs. 4
  • 5. Many times employees will feel as if their privacy was violated if they come to find out that their employer read their e- mails or looked through information in files they felt were personal. The court will generally first determine if the employee had a reasonable expectation that the information was in deed private, and then whether the employer’s actions were warranted or unnecessary. If the employer has a clause in their company handbook outlining Internet and e-mail usage, and employees acknowledge receipt and understanding of that policy, then the employee does not have a case for privacy infringement. However, if these handbook policies are not put into place, then the employer can be found negligent for enacting the proper precautions for its employees. Companies may also wish to purchase Internet usage software to monitor employee conduct and detect inappropriate e- mails and Internet usage. By using these programs, the company is establishing a balance between the privacy rights of employees and the employer’s need to protect themselves from liability. 5
  • 6. Claims of discrimination and harassment generally come as part of a hostile work environment claim in which an employee accuses another of conduct that is unwelcome. 6
  • 7. There are several other exposures that companies should be aware of if they have dealings on the Internet or via e-mail. Potential risks can dramatically affect one’s bottom line and devastate a business without precautions set into place. Here are the potential economy exposures. 7
  • 8. Here are some ways in which individuals or entities can violate others with regard to trademarked data property. 8
  • 9. Companies are being sued for copyright infringement more than ever because of the web-based usage of material that is registered. There are other risks that reside within the company such as an employee misappropriating a company’s trade secrets through e-mail, Internet bulletin board, blog posting or simply deleting them all together from the company system. 9
  • 10. Intellectual property disputes are also one of the risks of using the Internet to conduct business. Multiple companies may go through battle regarding ownership of content and licensing. Furthermore, website owners are liable for the content they place on their sites. These violations will continue to grow as it becomes easier to infringe on the property rights of others online. 10
  • 11. As websites gather information about visitors, whether it is credit card information or other important data, those who own the site are at risk of liability if accidentally or through employee misconduct, security is breached. This can happen within or even through a third party hacking into the company’s system. To combat these issues, site owners may wish to post a privacy policy and abide by it concerning private information. Furthermore, they can transfer their liability to a third party vendor that runs a secure website. In addition, the site controller can place unauthorized access controls forbidding those without strict security access to enter and infringe on any part of the site. 11
  • 12. Businesses using computers to interact with clients may also experience breaches to their security systems and virus attacks. One of the most notable viruses that devastated many companies was the “I LOVE YOU” virus that hit in May of 2000. This virus had dramatic impacts and caused many to lose a significant amount of revenue. In addition, if your site is providing a service to another company and it malfunctions, you could cause that third party to lose business or not be able to collect information that is crucial for their functions. 12
  • 13. Companies with these types of posting capabilities allow individuals to talk with one another quickly via the Internet, however there are liabilities involved with this function as well. Should one of your employees post defamatory information about a client, another employee or the company, this could be devastating to your business. 13
  • 14. Cyberliability insurance protection is a solid way to protect your electronic property from the aforementioned risks. The policies covered under the guise of cyberliability include any company with a web presence or business that performs e- commerce activities. The coverage include intangible economic losses such as those listed on the slide. 14
  • 15. Internet Liability coverage covers the following infractions. Also includes computer virus transmission, unauthorized access or use, loss of service and threats to damage or misuse another entity’s system, data or website. 15
  • 16. Coverage includes the following items listed on the slide. 16
  • 17. 17
  • 18. Explain to your client the different features offered from the various carriers available through your agency. Since these coverages vary from carrier to carrier, this slide and its content should be modified to suit the products you sell. 18
  • 19. This slide should also reflect the specific coverages you offer based on the carrier’s exclusions to the policies. Modify based on the exclusions present within the coverages you are trying to sell to your clients, as exclusions vary by policy. These specialty policies are designed to combat the exclusions that are present in a CGL policy. 19
  • 20. 20
  • 21. Take an opportunity to share your personal experiences with cyberliability. 21
  • 22. 22