SlideShare a Scribd company logo
1 of 22
Download to read offline
1
In today’s media and technology age, website owners, designers, hosts and Internet Service providers are presented with
multiple risks with regard to business and cyberspace. E-commerce now comprises approximately one-third of all the
business conducted on the Internet according to the Insurance Journal. Further, in 1999, businesses lost more than $20
billion because of power outages and hackers. Therefore, protection for your Internet-based resources must be a top
priority.




                                                                                                                          2
Since Internet commerce and use of the Internet in business settings for employees is prevalent and continues to grow in
popularity, insurance coverage is now offered to protect companies from exposures. These policies are incredibly
important because traditional insurance does not cover losses via the World Wide Web. In fact, these new digital risk
policies are just as important as specific policies for cars and homes. For instance, if you are store owner and someone
breaks in and physically damages several of your computers, your property coverage will cover the damages. However, if
someone from a distant location manipulates your firewall protection and gains remote access to your server and then
deletes and alters your data, you are not covered under general liability or property damage insurance. They simply do not
cover this type of activity, though some may argue that data is considered a form of “property.”




                                                                                                                             3
There are also risks associated with employee usage of the Internet and e-mail while on company time or using company-
owned programs.




                                                                                                                         4
Many times employees will feel as if their privacy was violated if they come to find out that their employer read their e-
mails or looked through information in files they felt were personal. The court will generally first determine if the
employee had a reasonable expectation that the information was in deed private, and then whether the employer’s actions
were warranted or unnecessary. If the employer has a clause in their company handbook outlining Internet and e-mail
usage, and employees acknowledge receipt and understanding of that policy, then the employee does not have a case for
privacy infringement. However, if these handbook policies are not put into place, then the employer can be found
negligent for enacting the proper precautions for its employees.


Companies may also wish to purchase Internet usage software to monitor employee conduct and detect inappropriate e-
mails and Internet usage. By using these programs, the company is establishing a balance between the privacy rights of
employees and the employer’s need to protect themselves from liability.




                                                                                                                             5
Claims of discrimination and harassment generally come as part of a hostile work environment claim in which an
employee accuses another of conduct that is unwelcome.




                                                                                                                 6
There are several other exposures that companies should be aware of if they have dealings on the Internet or via e-mail.
Potential risks can dramatically affect one’s bottom line and devastate a business without precautions set into place. Here
are the potential economy exposures.




                                                                                                                              7
Here are some ways in which individuals or entities can violate others with regard to trademarked data property.




                                                                                                                   8
Companies are being sued for copyright infringement more than ever because of the web-based usage of material that is
registered. There are other risks that reside within the company such as an employee misappropriating a company’s trade
secrets through e-mail, Internet bulletin board, blog posting or simply deleting them all together from the company
system.




                                                                                                                          9
Intellectual property disputes are also one of the risks of using the Internet to conduct business. Multiple companies may
go through battle regarding ownership of content and licensing. Furthermore, website owners are liable for the content
they place on their sites. These violations will continue to grow as it becomes easier to infringe on the property rights of
others online.




                                                                                                                               10
As websites gather information about visitors, whether it is credit card information or other important data, those who own
the site are at risk of liability if accidentally or through employee misconduct, security is breached. This can happen within
or even through a third party hacking into the company’s system. To combat these issues, site owners may wish to post a
privacy policy and abide by it concerning private information. Furthermore, they can transfer their liability to a third party
vendor that runs a secure website. In addition, the site controller can place unauthorized access controls forbidding those
without strict security access to enter and infringe on any part of the site.




                                                                                                                                 11
Businesses using computers to interact with clients may also experience breaches to their security systems and virus
attacks. One of the most notable viruses that devastated many companies was the “I LOVE YOU” virus that hit in May of
2000. This virus had dramatic impacts and caused many to lose a significant amount of revenue. In addition, if your site is
providing a service to another company and it malfunctions, you could cause that third party to lose business or not be
able to collect information that is crucial for their functions.




                                                                                                                              12
Companies with these types of posting capabilities allow individuals to talk with one another quickly via the Internet,
however there are liabilities involved with this function as well. Should one of your employees post defamatory
information about a client, another employee or the company, this could be devastating to your business.




                                                                                                                          13
Cyberliability insurance protection is a solid way to protect your electronic property from the aforementioned risks. The
policies covered under the guise of cyberliability include any company with a web presence or business that performs e-
commerce activities. The coverage include intangible economic losses such as those listed on the slide.




                                                                                                                            14
Internet Liability coverage covers the following infractions. Also includes computer virus transmission, unauthorized
access or use, loss of service and threats to damage or misuse another entity’s system, data or website.




                                                                                                                        15
Coverage includes the following items listed on the slide.




                                                             16
17
Explain to your client the different features offered from the various carriers available through your agency. Since these
coverages vary from carrier to carrier, this slide and its content should be modified to suit the products you sell.




                                                                                                                             18
This slide should also reflect the specific coverages you offer based on the carrier’s exclusions to the policies. Modify
based on the exclusions present within the coverages you are trying to sell to your clients, as exclusions vary by policy.
These specialty policies are designed to combat the exclusions that are present in a CGL policy.




                                                                                                                             19
20
Take an opportunity to share your personal experiences with cyberliability.




                                                                              21
22

More Related Content

What's hot

Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Browne Jacobson LLP
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Actiance enabling social_networks
Actiance enabling  social_networksActiance enabling  social_networks
Actiance enabling social_networksDavid ChoActiance
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Business Development Institute
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Business Development Institute
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 

What's hot (19)

Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Actiance enabling social_networks
Actiance enabling  social_networksActiance enabling  social_networks
Actiance enabling social_networks
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Cybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. InternetCybertort Imp Slides For Pub. Internet
Cybertort Imp Slides For Pub. Internet
 
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
Sarah Carter, Actiance Presentation - BDI 4/14/11 Financial Services Social C...
 
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
Actiance Presentation - BDI 2/9/11 Financial Services Social Communications L...
 
Cybertorts
CybertortsCybertorts
Cybertorts
 

Similar to Protecting Your Business in the Digital Age

Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential InformationKim Jensen
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And KeyYarko Petriw
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksDavid Chase
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesRichard Rendell
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfBytecode Security
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023basilmph
 

Similar to Protecting Your Business in the Digital Age (20)

Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 
Under Lock And Key
Under Lock And KeyUnder Lock And Key
Under Lock And Key
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial Risks
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web Services
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdf
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023
 
Data security
 Data security  Data security
Data security
 

More from Maran Corporate Risk Associates, Inc. (9)

Lateclaim
LateclaimLateclaim
Lateclaim
 
Aetna Health Care Timeline
Aetna Health Care TimelineAetna Health Care Timeline
Aetna Health Care Timeline
 
Kids to College WSJ Article
Kids to College WSJ ArticleKids to College WSJ Article
Kids to College WSJ Article
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Tax Efficient Investing Workshop
Tax Efficient Investing Workshop Tax Efficient Investing Workshop
Tax Efficient Investing Workshop
 
Flood insurance gets harder to find wsj.com
Flood insurance gets harder to find   wsj.comFlood insurance gets harder to find   wsj.com
Flood insurance gets harder to find wsj.com
 
Preparing for a hurricane
Preparing for a hurricanePreparing for a hurricane
Preparing for a hurricane
 
Hurricane preparedness white paper
Hurricane preparedness white paperHurricane preparedness white paper
Hurricane preparedness white paper
 
What Real People Say
What Real People Say What Real People Say
What Real People Say
 

Recently uploaded

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 

Recently uploaded (20)

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 

Protecting Your Business in the Digital Age

  • 1. 1
  • 2. In today’s media and technology age, website owners, designers, hosts and Internet Service providers are presented with multiple risks with regard to business and cyberspace. E-commerce now comprises approximately one-third of all the business conducted on the Internet according to the Insurance Journal. Further, in 1999, businesses lost more than $20 billion because of power outages and hackers. Therefore, protection for your Internet-based resources must be a top priority. 2
  • 3. Since Internet commerce and use of the Internet in business settings for employees is prevalent and continues to grow in popularity, insurance coverage is now offered to protect companies from exposures. These policies are incredibly important because traditional insurance does not cover losses via the World Wide Web. In fact, these new digital risk policies are just as important as specific policies for cars and homes. For instance, if you are store owner and someone breaks in and physically damages several of your computers, your property coverage will cover the damages. However, if someone from a distant location manipulates your firewall protection and gains remote access to your server and then deletes and alters your data, you are not covered under general liability or property damage insurance. They simply do not cover this type of activity, though some may argue that data is considered a form of “property.” 3
  • 4. There are also risks associated with employee usage of the Internet and e-mail while on company time or using company- owned programs. 4
  • 5. Many times employees will feel as if their privacy was violated if they come to find out that their employer read their e- mails or looked through information in files they felt were personal. The court will generally first determine if the employee had a reasonable expectation that the information was in deed private, and then whether the employer’s actions were warranted or unnecessary. If the employer has a clause in their company handbook outlining Internet and e-mail usage, and employees acknowledge receipt and understanding of that policy, then the employee does not have a case for privacy infringement. However, if these handbook policies are not put into place, then the employer can be found negligent for enacting the proper precautions for its employees. Companies may also wish to purchase Internet usage software to monitor employee conduct and detect inappropriate e- mails and Internet usage. By using these programs, the company is establishing a balance between the privacy rights of employees and the employer’s need to protect themselves from liability. 5
  • 6. Claims of discrimination and harassment generally come as part of a hostile work environment claim in which an employee accuses another of conduct that is unwelcome. 6
  • 7. There are several other exposures that companies should be aware of if they have dealings on the Internet or via e-mail. Potential risks can dramatically affect one’s bottom line and devastate a business without precautions set into place. Here are the potential economy exposures. 7
  • 8. Here are some ways in which individuals or entities can violate others with regard to trademarked data property. 8
  • 9. Companies are being sued for copyright infringement more than ever because of the web-based usage of material that is registered. There are other risks that reside within the company such as an employee misappropriating a company’s trade secrets through e-mail, Internet bulletin board, blog posting or simply deleting them all together from the company system. 9
  • 10. Intellectual property disputes are also one of the risks of using the Internet to conduct business. Multiple companies may go through battle regarding ownership of content and licensing. Furthermore, website owners are liable for the content they place on their sites. These violations will continue to grow as it becomes easier to infringe on the property rights of others online. 10
  • 11. As websites gather information about visitors, whether it is credit card information or other important data, those who own the site are at risk of liability if accidentally or through employee misconduct, security is breached. This can happen within or even through a third party hacking into the company’s system. To combat these issues, site owners may wish to post a privacy policy and abide by it concerning private information. Furthermore, they can transfer their liability to a third party vendor that runs a secure website. In addition, the site controller can place unauthorized access controls forbidding those without strict security access to enter and infringe on any part of the site. 11
  • 12. Businesses using computers to interact with clients may also experience breaches to their security systems and virus attacks. One of the most notable viruses that devastated many companies was the “I LOVE YOU” virus that hit in May of 2000. This virus had dramatic impacts and caused many to lose a significant amount of revenue. In addition, if your site is providing a service to another company and it malfunctions, you could cause that third party to lose business or not be able to collect information that is crucial for their functions. 12
  • 13. Companies with these types of posting capabilities allow individuals to talk with one another quickly via the Internet, however there are liabilities involved with this function as well. Should one of your employees post defamatory information about a client, another employee or the company, this could be devastating to your business. 13
  • 14. Cyberliability insurance protection is a solid way to protect your electronic property from the aforementioned risks. The policies covered under the guise of cyberliability include any company with a web presence or business that performs e- commerce activities. The coverage include intangible economic losses such as those listed on the slide. 14
  • 15. Internet Liability coverage covers the following infractions. Also includes computer virus transmission, unauthorized access or use, loss of service and threats to damage or misuse another entity’s system, data or website. 15
  • 16. Coverage includes the following items listed on the slide. 16
  • 17. 17
  • 18. Explain to your client the different features offered from the various carriers available through your agency. Since these coverages vary from carrier to carrier, this slide and its content should be modified to suit the products you sell. 18
  • 19. This slide should also reflect the specific coverages you offer based on the carrier’s exclusions to the policies. Modify based on the exclusions present within the coverages you are trying to sell to your clients, as exclusions vary by policy. These specialty policies are designed to combat the exclusions that are present in a CGL policy. 19
  • 20. 20
  • 21. Take an opportunity to share your personal experiences with cyberliability. 21
  • 22. 22