Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Preparing for a Data Breach with Cyber Insurance

By Collin Hite
December 31, 2015

Data breaches continue to escalate and garner national attention. The most recent news-making incident was the hack of electronic toy maker, VTech.

The Risk Insurance Management Society's (RIMS) Cyber Survey (May 2015) provides important benchmarking information for risk managers as they continue to grapple with data security and procurement of cyber insurance. One of the important takeaways is that most companies have standalone cyber insurance at this point, and those that don't are now seriously considering it. That is not a surprise considering the massive data breaches occurring recently ' Target, Anthem, Starwood, the U.S. government. Companies of all sizes need to consider cyber insurance as part of the overall program.

The situation is getting so bad that businesses, large and small, are finally realizing that the question is not if they will get breached, but when. And the sheer number of high-profile breaches in the last year reminds policyholders that cyber coverage is a critical part of any insurance program.

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.