<=

Committees Active on This Topic

News Releases

Additional Resources

NAIC/CIPR Articles

Contacts

Media queries should be directed to the NAIC Communications Division at 816-783-8909 or news@naic.org

Eric Nordman
Director, Regulatory Services and CIPR
816-783-8232

NAIC Center for Insurance Policy and Research (CIPR)

CIPR Homepage

Cybersecurity

Last Updated 7/20/16

Issue: Cybersecurity risks have become more significant as critical consumer financial and health information is increasingly stored in electronic form. As people become more reliant on electronic communication, and as businesses collect and maintain ever more granular pieces of information on their customers, the opportunity for bad actors to cause difficulties for businesses and the public is exploding. Recent high-profile data breaches have led regulators to work toward strengthening insurer defenses against attacks. In late 2014, the NAIC Executive (EX) Committee appointed the Cybersecurity (EX) Task Force to serve as the central focus for insurance regulatory activities related to cybersecurity.

Cyber Risk Management

In recent years, the demand for cyber insurance has increased significantly in response to sharply heightened risk awareness. However, managing cyber risks through insurance is relatively new. Although the market for cyber liability insurance is off to a good start, it is expected to grow dramatically over time as business gradually become more aware that current business policies do not adequately cover cyber risks. With each announcement of a system failure leading to a significant business loss, the awareness grows. This growing awareness has stimulated demand for cyber liability insurance products.

As data breaches occur more frequently, there are additional pressures for business to step up efforts to protect the personal information in their possession. Cyber-attacks may come from nation states, terrorists, criminals, activists, external opportunists and company insiders (both intentional and unintentional). Cybercriminals  attack to gain some type of political, military or economic advantage. They usually steal money or information that can eventually be monetized, such as credit card numbers, health records, personal identification information and tax returns.

Cyber risks include:

  • Identity theft as a result of security breaches where sensitive information is stolen by a hacker or inadvertently disclosed, including such data elements as Social Security numbers, credit card numbers, employee identification numbers, drivers’ license numbers, birth dates and PIN numbers.
  • Business interruption from a hacker shutting down a network.
  • Damage to the firm’s reputation.
  • Costs associated with damage to data records caused by a hacker.
  • Theft of valuable digital assets, including customer lists, business trade secrets and other similar electronic business assets.
  • Introduction of malware, worms and other malicious computer code.
  • Human error leading to inadvertent disclosure of sensitive information, such as an email from an employee to unintended recipients containing sensitive business information or personal identifying information.
  • The cost of credit monitoring services for people impacted by a security breach.
  • Lawsuits alleging trademark or copyright infringement.

Cyber Liability Policies

Most businesses are familiar with their commercial insurance policies providing general liability coverage to protect the business from injury or property damage. However, most standard commercial lines policies do not cover many of the cyber risks mentioned above. To cover these unique cyber risks through insurance requires the purchase of a special cyber liability policy. However, cyber risk remains difficult for insurance underwriters to quantify due in large part to a lack of actuarial data. Insurers compensate by relying on qualitative assessments of an applicant’s risk management procedures and risk culture. As a result, policies for cyber risk are more customized than other risk insurers taken on, and, therefore, more costly. The type of business operation will dictate the type and cost of cyber liability coverage. The size and scope of the business will play a role in coverage needs and pricing, as will the number of customers, the presence on the Web, the type of data collected and stored, and other factors.

Cyber liability policies might include one or more of the following types of coverage:

  • Liability for security or privacy breaches. This would include loss of confidential information by allowing, or failing to prevent, unauthorized access to computer systems.
  • The costs associated with a privacy breach, such as consumer notification, customer support and costs of providing credit monitoring services to affected consumers.
  • The costs associated with restoring, updating or replacing business assets stored electronically.
  • Business interruption and extra expense related to a security or privacy breach.
  • Liability associated with libel, slander, copyright infringement, product disparagement or reputational damage to others when the allegations involve a business website, social media or print media.
  • Expenses related to cyber extortion or cyber terrorism.
  • Coverage for expenses related to regulatory compliance for billing errors, physician self-referral proceedings and Emergency Medical Treatment and Active Labor Act proceedings.

Securing a cyber-liability policy will not be a simple task. Insurers writing this coverage will be interested in the risk-management techniques applied by the business to protect its network and its assets. The insurer will probably want to see the business’ disaster response plan and evaluate it with respect to the business’ risk management of its networks, its website, its physical assets and its intellectual property. The insurer will most likely be keenly interested in how employees and others are able to access data systems. At a minimum, the insurer will probably want to know about antivirus and anti-malware software, the frequency of updates and the performance of firewalls.

Status: The NAIC and state insurance regulators are increasing efforts to tackle cybersecurity issues. The Cybersecurity (EX) Task Force adopted the Principles for Effective Cybersecurity Insurance Regulatory Guidance in April 2015. The 12 principles adopted direct insurers, producers, and other regulated entities to join forces in identifying risks and adopting practical solutions to protect information entrusted to them. Additionally, the NAIC is developing new reporting requirements for insurers to better track cyber insurance policies issued in the marketplace.

The NAIC is moving forward with additional initiatives designed to help protect consumer information and educate the public about cyber risks. The NAIC has proposed an Insurance Data Security Model Law that will establish the exclusive standards for data security and investigation and notification of a breach of data security applicable to insurance providers. Furthermore, the Cybersecurity (EX) Task Force has worked extensively to develop a Cybersecurity Consumer Bill of Rights detailing what consumers can expect from insurance companies, agents and other businesses following a data breach. After extensive review and discussion, the Bill of Rights was adopted by the NAIC Executive (EX) Committee and Plenary on Dec. 17, 2015 and the title amended  the “NAIC Roadmap for Cybersecurity Consumer Protections .”

 The Cybersecurity (EX) Task Force also worked with the Property and Casualty Insurance (C) Committee and the Financial Condition (E) Committee to develop the Cybersecurity and Identity  Theft Insurance Coverage Supplement for insurer financial statements to gather financial performance information about insurers writing cyber-liability coverage nationwide. Early analysis showed that in 2015, more than 500 insurers provided businesses and individuals with cyber insurance in the United States. The vast majority of these coverages were written as endorsements to commercial and personal policies. There are also a significant number of non-U.S. surplus lines insurers writing cyber-risk coverages. The NAIC also updated its Financial Condition Examiners Handbook and will be updating the Market Regulation Handbook.

State insurance regulators also continue to work collaboratively with other financial regulators, Congress and the Obama Administration to identify specific threats and develop strategies to protect the financial infrastructure of the U.S. Insurance commissioners, state insurance regulators and NAIC staff are active members of the Treasury Department’s Financial Banking and Information Infrastructure Committee (FBIIC), as well as the White House’s Regulatory Cybersecurity Forum for Independent and Executive Branch Regulators. The NAIC strongly opposes H.R. 2205, the “Data Security Act," which would severely hamper state insurance regulators ability to protect consumers in the cybersecurity arena.