{"id":6700,"date":"2020-09-03T13:54:19","date_gmt":"2020-09-03T13:54:19","guid":{"rendered":"https:\/\/www.bgs.com\/blog\/?p=6700"},"modified":"2020-09-03T14:27:54","modified_gmt":"2020-09-03T14:27:54","slug":"cyber-liability-coverage-read-that-policy-carefully","status":"publish","type":"post","link":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/","title":{"rendered":"Cyber Liability Coverage \u2013 Read that Policy Carefully!"},"content":{"rendered":"\n<p>Cyber insurance, also referred to as cyber risk insurance or cyber liability insurance policy coverage, is an insurance policy. Any company that uses technology to do business (i.e. pretty much every company\u2026) should evaluate its need for this type of policy, review the policy language carefully, and verify that policy limits are sufficient. Before cyber insurance coverage became common, in the event of a data breach or other cyber event an insured might have tried to make a claim under its general liability insurance. These claims were frequently denied. With the advent of cyber insurance policies, a more specific product was made available, and may provide the coverage needed.<\/p>\n\n\n\n<p>Cyber insurance applies to data breaches and specified cyber events. The typical policy provides coverage for various costs that may be incurred in a data breach situation \u2013 for instance, many policies will provide assistance in verifying and recovering from a data breach. As with any insurance policy, it is important to read the exclusions and be aware of events that are NOT covered.<\/p>\n\n\n\n<p>Not all policies are created equally. Consideration should be given to your specific goals.<\/p>\n\n\n\n<p>Cyber risk insurance often,<strong> though not always, <\/strong>covers:<\/p>\n\n\n\n<ol><li>Loss or damage to data (i.e. the cost to replace or restore electronic data belonging to the insured or a third party)<\/li><li>Loss of income (for instance, from a business shutdown caused by the cyber event)<\/li><li>Cyber extortion: assistance in responding to and paying a hacker\u2019s demand<\/li><li>Forensic expenses: hiring an outside team to manage discovery work<\/li><li>Legal expenses: to determine notification requirements required by law, as well as defense in the event a lawsuit is filed against the insured<\/li><li>Notification expenses (applicable law and\/or company contracts will surely require that persons impacted by the cyber event are notified)<\/li><li>Regulatory fines and penalties<\/li><li>Repairs and monitoring of affected parties\u2019 credit<\/li><li>Reputation restoration expenses (maybe)<\/li><\/ol>\n\n\n\n<p>Cyber insurance policies generally<strong> do not cover:<\/strong><\/p>\n\n\n\n<ol><li>Potential future lost profits<\/li><li>Costs beyond the policy limits<\/li><li>Loss of value due to theft of your intellectual property<\/li><li>Betterment: the cost to improve internal technology systems, including any software or security upgrades after a cyber-data breach event<\/li><\/ol>\n\n\n\n<p>Distinctions in types of coverage are best illustrated by actual events. In 2017, the NotPetya or \u201cGoldenEye\u201d Trojan horse malware attack struck international companies including Merck &amp; Co., a global drug manufacturer, and Mondelez, the owner of dozens of well recognized global food brands. Other entities, including government entities, suffered as well. The NotPetya malware attack is considered the most devastating cyber-attack to date. When the US government found Russia responsible, insurers invoked the \u201cwar exclusion\u201d provision found in many policies, and denied hundreds of millions of dollars of claims, including those by Merck and Mondelez. Litigation ensued that still continues to this day, and the issues highlighted the need for standalone and more robust policies than were previously in place.<\/p>\n\n\n\n<p>Because cyber liability insurance policies <strong>vary from one carrier to another<\/strong>, it\u2019s important that an expert assist you in reviewing your insurance policies in relation to your specific needs and goals.<\/p>\n\n\n\n<p>Barna, Guzy &amp; Steffen has an outstanding team of software, IT, and corporate contract specialists available to assist you and your company in these and other areas. <a href=\"https:\/\/www.bgs.com\/contact\" target=\"_blank\" rel=\"noreferrer noopener\">Connect with us<\/a> today. We look forward to hearing from you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber insurance, also referred to as cyber risk insurance or cyber liability insurance policy coverage, is an insurance policy. Any company that uses technology to do business (i.e. pretty much every company\u2026) should evaluate its need for this type of policy, review the policy language carefully, and verify that policy limits are sufficient. Before cyber insurance coverage became common, in the event of a data breach or other cyber event an insured might have tried to make a claim under its general liability insurance. These claims were frequently denied. With the advent of cyber insurance policies, a more specific product was made available, and may provide the coverage needed. Cyber insurance applies to data breaches and specified cyber events. The typical policy provides coverage for various costs that may be incurred in a data breach situation \u2013 for instance, many policies will provide assistance in verifying and recovering from a data breach. As with any insurance policy, it is important to read the exclusions and be aware of events that are NOT covered. Not all policies are created equally. Consideration should be given to your specific goals. Cyber risk insurance often, though not always, covers: Loss or damage to data (i.e. the cost to replace or restore electronic data belonging to the insured&#8230;<\/p>\n","protected":false},"author":14,"featured_media":6704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[55],"tags":[60,56,57,58,59,61],"coauthors":[54],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Liability Coverage - Read That Policy Carefully! | BGS<\/title>\n<meta name=\"description\" content=\"Any company that uses technology to do business should evaluate its need for cyber risk insurance or cyber liability insurance. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Liability Coverage - Read That Policy Carefully! | BGS\" \/>\n<meta property=\"og:description\" content=\"Any company that uses technology to do business should evaluate its need for cyber risk insurance or cyber liability insurance. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/\" \/>\n<meta property=\"og:site_name\" content=\"Barna, Guzy &amp; Steffen, LTD.\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-03T13:54:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-03T14:27:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bgs.com\/blog\/wp-content\/uploads\/2020\/09\/Cyber-Liability-Barna-Guzy-Steffen-930x450-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Carole Clark Isakson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carole Clark Isakson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/\",\"url\":\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/\",\"name\":\"Cyber Liability Coverage - Read That Policy Carefully! | BGS\",\"isPartOf\":{\"@id\":\"https:\/\/www.bgs.com\/blog\/#website\"},\"datePublished\":\"2020-09-03T13:54:19+00:00\",\"dateModified\":\"2020-09-03T14:27:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.bgs.com\/blog\/#\/schema\/person\/cf578526284af48ebb41a289d9ac0be9\"},\"description\":\"Any company that uses technology to do business should evaluate its need for cyber risk insurance or cyber liability insurance. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bgs.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Liability Coverage \u2013 Read that Policy Carefully!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bgs.com\/blog\/#website\",\"url\":\"https:\/\/www.bgs.com\/blog\/\",\"name\":\"Barna, Guzy &amp; Steffen, LTD.\",\"description\":\"Attorneys at Law\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bgs.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bgs.com\/blog\/#\/schema\/person\/cf578526284af48ebb41a289d9ac0be9\",\"name\":\"Carole Clark Isakson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bgs.com\/blog\/#\/schema\/person\/image\/9ca7f6dc65e967327cdf64c06a921b7c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f7756f9fb8a1d2dff6bdce502e9555e2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f7756f9fb8a1d2dff6bdce502e9555e2?s=96&d=mm&r=g\",\"caption\":\"Carole Clark Isakson\"},\"url\":\"https:\/\/www.bgs.com\/blog\/author\/carole-clark-isakson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Liability Coverage - Read That Policy Carefully! | BGS","description":"Any company that uses technology to do business should evaluate its need for cyber risk insurance or cyber liability insurance. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Liability Coverage - Read That Policy Carefully! | BGS","og_description":"Any company that uses technology to do business should evaluate its need for cyber risk insurance or cyber liability insurance. Learn more.","og_url":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/","og_site_name":"Barna, Guzy &amp; Steffen, LTD.","article_published_time":"2020-09-03T13:54:19+00:00","article_modified_time":"2020-09-03T14:27:54+00:00","og_image":[{"width":930,"height":450,"url":"https:\/\/www.bgs.com\/blog\/wp-content\/uploads\/2020\/09\/Cyber-Liability-Barna-Guzy-Steffen-930x450-1.jpg","type":"image\/jpeg"}],"author":"Carole Clark Isakson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Carole Clark Isakson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/","url":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/","name":"Cyber Liability Coverage - Read That Policy Carefully! | BGS","isPartOf":{"@id":"https:\/\/www.bgs.com\/blog\/#website"},"datePublished":"2020-09-03T13:54:19+00:00","dateModified":"2020-09-03T14:27:54+00:00","author":{"@id":"https:\/\/www.bgs.com\/blog\/#\/schema\/person\/cf578526284af48ebb41a289d9ac0be9"},"description":"Any company that uses technology to do business should evaluate its need for cyber risk insurance or cyber liability insurance. Learn more.","breadcrumb":{"@id":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bgs.com\/blog\/2020\/09\/03\/cyber-liability-coverage-read-that-policy-carefully\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bgs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Liability Coverage \u2013 Read that Policy Carefully!"}]},{"@type":"WebSite","@id":"https:\/\/www.bgs.com\/blog\/#website","url":"https:\/\/www.bgs.com\/blog\/","name":"Barna, Guzy &amp; Steffen, LTD.","description":"Attorneys at Law","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bgs.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.bgs.com\/blog\/#\/schema\/person\/cf578526284af48ebb41a289d9ac0be9","name":"Carole Clark Isakson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bgs.com\/blog\/#\/schema\/person\/image\/9ca7f6dc65e967327cdf64c06a921b7c","url":"https:\/\/secure.gravatar.com\/avatar\/f7756f9fb8a1d2dff6bdce502e9555e2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7756f9fb8a1d2dff6bdce502e9555e2?s=96&d=mm&r=g","caption":"Carole Clark Isakson"},"url":"https:\/\/www.bgs.com\/blog\/author\/carole-clark-isakson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/posts\/6700"}],"collection":[{"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/comments?post=6700"}],"version-history":[{"count":2,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/posts\/6700\/revisions"}],"predecessor-version":[{"id":6703,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/posts\/6700\/revisions\/6703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/media\/6704"}],"wp:attachment":[{"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/media?parent=6700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/categories?post=6700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/tags?post=6700"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.bgs.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}