Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain, and that makes those firms subject to unnecessary risk for theft of client data.
Combined with the inadequate security most law firms provide for client data anyway, the resulting exposure risk may well violate legal professional ethics. A firm's failure to adequately protect the following is a violation of Bar Association requirements to preserve client files and, more generally, a failure of the firm's overall duty to act competently in the best interests of its clients:
Types of Exposure
Computer security breaches can have a first-party impact (on the firm itself) and a third-party impact (on clients). For example, an unauthorized system access that damages data or online services may render the firm itself inoperable. (Even this scenario may also lead to a third-party loss to clients if they rely on the firm's extranet for aspects of their own business operations.)
Typical examples of third-party harms are identity theft and invasion of clients' privacy. Yet another area of exposure is Web site content and the infringement of a third party's intellectual property. A hacker could access the system to grab control of an e-mail database or client mailing list. The hacker could also usurp the firm's system to send out damaging malicious code, such as computer viruses or worms.
When a third party is harmed and the firm is responsible, of course, a lawsuit will likely be filed.
Many insurers simply do not provide coverage for these unique exposures, or they take a band-aid approach by providing endorsements to their traditional property, fidelity or professional-liability insurance policies.
Cyberinsurance
The most effective way to provide relatively comprehensive coverage for computer disasters is through cyberinsurance, a specialized form of computer insurance that organizations such as American International Group, Chubb and Lloyd's of London have offered since the late 1990s.
An effective cyberinsurance policy can handle first-party losses and any third-party liabilities that a firm faces in a computer-security disaster. Typical coverages include the following:
Purchase Options
Cyberinsurance usually costs more than conventional liability or business-interruption insurance. Unlike traditional insurance policies, cyberinsurance has no standard 'scoring system' or actuarial tables for pricing premiums. Each insurance company has its own way of grading customers, with methods varying according to the type of insurance. Before insurers provide a cyberinsurance-policy quote, they usually require potential purchasers to fill out a questionnaire detailing the steps already implemented to ensure computer security:
A law firm's desire to buy cyberinsurance is no guarantee that a carrier will sell coverage. Industry estimates are that about 10% of applicants are turned down, and around 25% pay higher premiums or have coverage restrictions because they don't have adequate data-security procedures in place. Some insurers require verification of safeguards by an outside data-security firm, just as they might require a potential or existing customer to have a physical examination by a physician before issuing a life-insurance policy.
The costs of cyberinsurance vary substantially. A June Computerworld assessment by Lamont Wood (see, http://tinyurl.com/3co9hd) quotes two insurance executives as saying that policies could cost anywhere from $7500 to $20,000 per million dollars of coverage. An insurance broker noted that costs for his company's network-risk policies ($10,000 to $20,000 per million dollars of coverage) would double if coverage were added for professional-service errors and omissions. Wood
quotes an exasperated customer who asked five insurers to bid on identical coverage and received quotes ranging from $16,000 to $70,000 per year.
Purchase Strategies
Principals of any firm interested in cyberinsurance should first review liability coverage they already have. Here are some steps to take on the journey to securing cyberinsurance:
The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain, and that makes those firms subject to unnecessary risk for theft of client data.
Combined with the inadequate security most law firms provide for client data anyway, the resulting exposure risk may well violate legal professional ethics. A firm's failure to adequately protect the following is a violation of Bar Association requirements to preserve client files and, more generally, a failure of the firm's overall duty to act competently in the best interests of its clients:
Types of Exposure
Computer security breaches can have a first-party impact (on the firm itself) and a third-party impact (on clients). For example, an unauthorized system access that damages data or online services may render the firm itself inoperable. (Even this scenario may also lead to a third-party loss to clients if they rely on the firm's extranet for aspects of their own business operations.)
Typical examples of third-party harms are identity theft and invasion of clients' privacy. Yet another area of exposure is Web site content and the infringement of a third party's intellectual property. A hacker could access the system to grab control of an e-mail database or client mailing list. The hacker could also usurp the firm's system to send out damaging malicious code, such as computer viruses or worms.
When a third party is harmed and the firm is responsible, of course, a lawsuit will likely be filed.
Many insurers simply do not provide coverage for these unique exposures, or they take a band-aid approach by providing endorsements to their traditional property, fidelity or professional-liability insurance policies.
Cyberinsurance
The most effective way to provide relatively comprehensive coverage for computer disasters is through cyberinsurance, a specialized form of computer insurance that organizations such as
An effective cyberinsurance policy can handle first-party losses and any third-party liabilities that a firm faces in a computer-security disaster. Typical coverages include the following:
Purchase Options
Cyberinsurance usually costs more than conventional liability or business-interruption insurance. Unlike traditional insurance policies, cyberinsurance has no standard 'scoring system' or actuarial tables for pricing premiums. Each insurance company has its own way of grading customers, with methods varying according to the type of insurance. Before insurers provide a cyberinsurance-policy quote, they usually require potential purchasers to fill out a questionnaire detailing the steps already implemented to ensure computer security:
A law firm's desire to buy cyberinsurance is no guarantee that a carrier will sell coverage. Industry estimates are that about 10% of applicants are turned down, and around 25% pay higher premiums or have coverage restrictions because they don't have adequate data-security procedures in place. Some insurers require verification of safeguards by an outside data-security firm, just as they might require a potential or existing customer to have a physical examination by a physician before issuing a life-insurance policy.
The costs of cyberinsurance vary substantially. A June Computerworld assessment by Lamont Wood (see, http://tinyurl.com/3co9hd) quotes two insurance executives as saying that policies could cost anywhere from $7500 to $20,000 per million dollars of coverage. An insurance broker noted that costs for his company's network-risk policies ($10,000 to $20,000 per million dollars of coverage) would double if coverage were added for professional-service errors and omissions. Wood
quotes an exasperated customer who asked five insurers to bid on identical coverage and received quotes ranging from $16,000 to $70,000 per year.
Purchase Strategies
Principals of any firm interested in cyberinsurance should first review liability coverage they already have. Here are some steps to take on the journey to securing cyberinsurance:
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.