Visit www.barracudasecurity.com

Legend

Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED

Saturday, February 10, 2007

CALIFORNIA CYBERINSURANCE: AN ADDED LAYER OF SECURITY YOU SHOULD KNOW ABOUT Legal Technology - Cyberinsurance: An Added Layer of Security You Should Know About:

Cyberinsurance: An Added Layer of Security You Should Know About

Confidential client records and work product are the core of any law firm's work product. Most firms understand the necessity of archiving computer and paper files in a safe, off-site location. But what about the active files on your computer?

If they are compromised by a hacker, or otherwise threatened by criminal activity, how would it affect your operation?

A recent survey of businesses and professional organizations, conducted jointly by the Federal Bureau of Investigation and the Computer Security Institute, provides these chilling statistics:

  • Ninety percent of survey participants have suffered a computer security breach, with average losses running into the hundreds of thousands of dollars.
  • The two biggest sources of financial loss from computer security breaches are viruses (accounting for 33 percent of the total) and unauthorized access (causing one-fourth of all computer security losses).
  • Theft of proprietary information is the fastest rising cause of computer security financial loss, doubling from the year before in the most recent survey.

LIABILITY INSURANCE

Most firms have some form of liability insurance to protect premises and their contents against losses from fire or other disasters. But computer security risks are fundamentally different -- and fundamentally unprotected by most policies.

Several years ago, Ernst & Young surveyed several thousand organizations about whether they had insurance coverage for losses related tocomputer security. More than 33 percent of respondents thought they had coverage through their general liability policies, but in fact did not. More than half either knew that they lacked coverage and had done nothing about it, or simply didn't know their coverage.

ETHICAL RESPONSIBILITY

Such a head-in-the-sand attitude, quite frankly, is a violation of a lawyer's professional ethics. Failure to reasonably anticipate and be prepared to service clients in the wake of a disaster is arguably a failure in the overall duty to act competently or in the best interests of your client.

There is a first-party side (affecting your firm directly) and a third-party side (affecting your clients) to this. A variety of first-partycomputer security disasters can lead to loss, such as a breach of security and unauthorized access to your systems, which damages your data or vandalizes your Web site, rendering you inoperable that day. This latter scenario may also lead to a third-party loss to those clients whose reliance on your system is key to their livelihood -- a perfect example would be clients who depend on being served through an extranet. All of these situations would impact your firm financially and are considered first-party losses.

When a third party is injured or harmed and your firm is responsible, a third-party lawsuit will likely be filed against you. This can include such exposures as identitytheft or the invasion of your clients' privacy. Another area of exposure is Web site content and the infringement of a third party's intellectual property.

A hacker could access your system, grab your e-mail database and client mailing list and use your system to send out damaging malicious code, such as acomputer virus or worm.

ALTERNATIVES

Many insurers do not provide specialized coverage for these unique exposures, or will try to take a Band-Aid approach by providing endorsements to traditional policies, such as property, fidelity and professional liability insurance.

The only really effective way to ensure that your firm and clients will not suffer loss through a computer disaster is cyberinsurance -- a specialized form of computer insurance coverage that insurance organizations such as American International Group, Chubb and Lloyd's of London have offered since the late 1990s.

An effective cyberinsurance policy can handle the first-party and third-party liabilities that your firm faces in a computer security disaster. These are typical kinds of coverage that are available:

  • First-party business interruption covers revenue lost during system downtime caused by accidents and security breaches. Losses during catastrophic regional power outages are typically excluded, but that's little different from standard exclusions for floods or other "acts of God."
  • First-party electronic data damage covers recovery costs associated with compromised data, such as virus infections.
  • First-party extortion covers ransom demands of hackers who claim to control systems or data and threaten to do serious harm.
  • Third-party network security liability covers losses associated with the compromise and misuse of data for such purposes as identitytheft and credit card fraud.
  • Third-party (downstream) network liability covers judgments from lawsuits initiated by those harmed by denial-of-service attacks and viruses sent out over your system.
  • Third-party media liability covers infringement and liability costs associated with Internet publishing, including Web sites, e-mail and other interactive online communication.

PURCHASE OPTIONS

Cyberinsurance usually costs more than conventional liability or business interruption insurance. Unlike traditional insurance policies, cyberinsurance has no standard scoring system or actuarial tables for pricing premiums. Each insurance company has its own way of grading customers, with methods varying according to the type of insurance. Before insurers will provide a policy quote, they usually require potential cyberinsurance purchasers to fill out a questionnaire detailing the steps they've already taken to ensurecomputer security -- firewalls, laptop computer encryption, antivirus protection and similar common-sense steps that all firms should take.

If you are interested in cyberinsurance, you should first review your current coverage. Are you spending too much on the traditional plans, such as property, and errors and omissions, when more of your firm's worth resides in unprotected data? If so, you need to understand not only what your data is worth to you, but how your systems affect your firm's bottom line. You should attempt to quantify how much you could lose from a computer disaster. Insurance costs money, so calculate the income loss so you can make better-informed decisions. Ultimately, the greatest loss may be in client confidence and resulting disciplinary action.

Attorney Edward Poll is the principal of Venice, Calif.-based LawBiz Management Co. and Edward Poll & Associates Inc. He is the author of the LawBiz Blog, www.lawbizblog.com. He can be reached at edpoll@lawbiz.com.

No comments: