Blog on insurance coverage legal issues in the Pacific Northwest of the United States.
About The Northwest Policyholder
Friday, July 24, 2015
Neiman Marcus Data Breach Decision Portends Greater Risk for NW Companies, Need for Cyber Coverage
This decision is only binding in the federal districts within the Seventh Circuit, but as Kevin LaCroix has pointed out in his blog, as a first-in-the-nation decision from an appellate court in this exact scenario, it is likely to be influential. That is even more true for claims brought in the Northwest, for two reasons.
First, the Seventh Circuit cited extensively to a decision from the Northern District of California in the Adobe Systems data breach case, In re Adobe Sys., Inc. Privacy Litig., No. 13–CV–05226–LHK, 2014 WL 4379916 (N.D. Cal. Sept. 4, 2014). (That decision is available here.) The Adobe decision relied on pre-Clapper case law from the Ninth Circuit, and has already been cited twice this year to support a finding of standing in a data breach/data privacy class action, the first brought by Sony employees, and the second by users of the Google Wallet. Those cases had already established the Ninth Circuit (and therefore the Northwest) as a favorable venue for data breach class actions.
Second, the Premera Blue Cross class action complaints involving the massive data breach at that company, and involving claims under Oregon and Washington law, have all been consolidated in the federal court in Oregon, and have been assigned to Judge Michael Simon. Judge Simon, a former Perkins Coie partner, is inclined toward issuing cerebral and thoroughly-reasoned decisions that often have a pro-consumer bent. I would not be surprised to see a lengthy decision from Judge Simon in the near future along the lines of the Seventh Circuit's decision, giving plaintiff's lawyers a road map for obtaining standing in data breach cases and how to properly bring claims under Oregon and Washington law.
What does any of this have to do with insurance? Well, if you are a non-Northwest company with operations in the Northwest looking at cyber insurance, and trying to assess company-wide risk, you cannot rely on decisions from courts in your "home" jurisdiction that have made it hard for these types of claims to go forward. If you are a Northwest business that handles a lot of consumer data, the risk of a class action in the event of a breach just went up a little but. Even if the claims are absolutely meritless, they will get past the motion to dismiss stage, which means that defense costs will be considerable. All of that should be fodder for your next conversation with your insurance and legal advisers about your company's cyber-coverage, and particularly defense cost coverage and limits.
Update: As reported by my colleague Brian Sniffen in our blog IP Law Trends, Neiman Marcus has now requested en banc review of this decision. En banc review is rarely granted.
Certain cases reprinted from WestlawNext with permission of Thomson Reuters. If you wish to check the currency of this case by using KeyCite on WestlawNext, then you may do so by visiting www.next.westlaw.com.
Wednesday, May 27, 2015
Lessons From CNA's Suit to Avoid Covering a Hospital Cyber-Breach
(NB: although we wouldn't normally cover California litigation, this filing raises red-hot issues so we decided to make an exception.)
First, because there is so little claims history in the "cyber" world, and because the risks are so high, insurers are requiring applicants to answer lots of questions and go through unusually detailed "self-assessments." That's not a problem if the folks filling out the application thoroughly vet the answers with IT, legal, and the contracts department. But any breakdown in communication among those players can result in coverage problems.
Second, because of the evolving nature of cyber risks (and because it is the nature of their approach to the business) insurance companies frequently use vague wording in application materials and in their policies. Vague language allows the insurer to argue after the fact a particular meaning that favors them. We can see that in action in this case, in the question asking whether Cottage did a yearly re-assessment of risks and "enhanced" its "risk controls in response to changes." What does that mean? Does that mean that if there is an increase in "spear-phishing" attacks the company must eliminate the use of email? Or is it good enough to adopt published "best practices" - a rule of reasonableness? Those are the kind of questions that may be litigated in this case - questions that could have been avoided if the insurer had not been able to get away with vague language that it could later use to its advantage.
Third, vendors. Vendors, the cause of so many data security problems, create substantial problems when it comes to insurance. What is a reasonable security precaution to a hospital may seem like overkill to an outsourced IT or cloud provider, or the reverse may be true, and there is often no practical way to monitor changes that a vendor makes in its security practices. That makes it very difficult to accurately answer a question about whether a vendor uses the same security standards as the insurance applicant. It is also particularly difficult to ensure, as the CNA application asked, that every vendor "maintain[s] enough insurance to cover their liability arising from a breach of privacy or confidentiality" when there are no standardized forms for cyber coverage that can be required in the vendor contract, and where the risks to the vendor may be dramatically different than those of the customer.
In this case it appears that CNA is trying to avoid coverage using Cottage's "warranty" to comply with vaguely-worded promises that Cottage made about its security practices in a case where negligent oversight of a vendor caused an accidental data breach. That is, of course, exactly why a business buys liability insurance - to cover an accident caused through negligence. The fact that CNA is relying on vague language against its customer, Cottage, rather than giving Cottage the benefit of the doubt, demonstrates that this insurer, at least, is willing to use the kind of sharp-elbow tactics to limit its loss payments that we see with other kinds of coverage. In other words, cyber coverage is not going to be treated differently by the insurance industry and its lawyers.
To try to avoid this kind of situation, businesses would be well advised to treat cyber coverage applications very carefully, to try to negotiate "warranty" language that is less onerous and open-ended, and to exercise increased oversight of vendor contracts and compliance with contract terms, including actually reviewing the vendor's insurance policies and security practices. Taking those steps will not of course eliminate coverage disputes of this sort, but in this area, every step is an important one.
Tuesday, May 26, 2015
Premera Data-Breach Class Action Claims Illustrate Cyber Coverage Issues
Monday, April 27, 2015
Cert Grant in FCRA Case Could Impact Cyber Coverage
In Robins, the plaintiff claimed to have been harmed when Spokeo, an online directory that aggregates publicly-available personal information, published inaccurate information about him on the site. The plaintiff contended that in doing so Spokeo violated the Fair Credit Reporting Act (FCRA), but he could not prove specific damages tied to the inaccurate information. Instead, he claimed entitlement under the FCRA to "statutory damages" (typically set at $1,000 per violation). Robins sued on behalf of a class of people -- allegedly numbering in the thousands -- who were similarly aggrieved by Spokeo's failure to report accurate information. The trial court dismissed the suit based on the constitutional requirements that a plaintiff demonstrate "standing" based on "actual or imminent harm." The Ninth Circuit, however, reversed, reasoning that Congress could create a statutory right and in essence create standing by providing a private right of action for violation of that right. The Supreme Court has agreed to decide whether that view of Congress' power is correct.
What does this have to do with cyber-insurance? Plenty. For one thing, the decision may undermine state laws that have fueled the market for robust first-party cyber coverage. Many consumer advocates believe that data-breach notification laws will be ineffective at forcing businesses to "fess up" when a breach happens unless the breach law contains a private right of action with a small statutory damages component, modeled on FCRA. Washington's data-breach law, recently amended, is just such a law. The spread of such laws has driven the market for cyber policies that will cover not just the cost of notifications but also for liability protection relating to breach notification. And just as many predict that legislation working its way through Congress allowing companies to confidentially share data on cyber breaches may eventually bring rates down, state legislation has had an impact on premiums that may be blunted by the Court's decision in Robins.
Beyond breach-notification laws, the way that the Supreme Court approaches the "actual or imminent harm" question could impact how courts handle data breach consumer lawsuits that do not rely on any federal statute but instead are based on common-law grounds, such as negligence or fiduciary duty. Some courts have dismissed consumer lawsuits that fail to allege specific harm arising from a breach, while other courts have allowed those suits to proceed at least into the discovery phase. The Supreme Court might take this opportunity to address "standing" more generally, leading to fewer consumer class actions, which could further result in lower premiums for cyber coverage.
Wednesday, April 22, 2015
Data Breaches at Franchisees Raise Cyber Insurance Issues
Tuesday, April 7, 2015
Likely Changes to Oregon Data Breach Law Should Prompt Review of Cyber Coverage
This excellent post by my colleague Brian Sniffen in our firm's IP Law Trends blog reports on the efforts by Oregon's attorney to strengthen the state's data breach notification laws. The proposed amendments to the Oregon Consumer Identity Theft Protection Act (ORS 646A.602 et seq.) are part of Senate Bill 601, which is making its way through the legislature right now. You can follow the bill's progress here).
As Brian reports, among the proposed changes are a lowering of the threshold for notification to the Attorney General to 100 records; expansion of the definition of confidential data to include medical and biometric information; and giving enforcement power to the Attorney General under the Unfair Trade Practices Act.
As we observed last week in our post about the insurance implications of Washington's effort to toughen its data-breach notification laws, these proposed Oregon changes should prompt every business -- whether it handles loads of consumer data or not -- to review its cyber insurance coverage to get a comfort level with any sub-limits relating to notification costs, and liability coverage for regulatory claims. Of course, both state-level efforts could be upended if the President's proposed data-breach bill becomes federal law, because the federal law will likely trump all state laws. All the more reason to review your cyber coverage with an insurance professional today.
Update April 22: The Oregon bill has received a "do pass" recommendation, with some amendments, from the Senate Judiciary Committee, and is awaiting transfer to the floor for passage.
Tuesday, March 17, 2015
Washington Policyholders, Check Your Cyber Policy as Data BreachNotification Law Moves Forward
What does this mean from an insurance standpoint? Cyber insurance policies typically provide "first-party" coverage for the costs of data breach notification, but often contain very low sub-limits on that coverage. In a state like Washington with a weak data breach notification law a business could in theory get away with a low sub-limit because only in a rare set circumstances would broad-based notification be required. That will no longer be the case and so those sub-limits, and any other restrictions placed on notification coverage, need to be re-examined. And of course if your business lacks cyber coverage entirely, it is time to explore your options. The most recent data on the cost of data breaches indicates that the cost of notification is the fourth-biggest category of impact from a data breach (after lost reputation; lost time/productivity; cost of new technology). By comparison the cost of regulatory fines and lawsuits was tenth in the ranking of impacts on businesses experiencing a breach. The conventional wisdom is that a business should expect to spend at least $188 per record on notification and similar first-party response-related costs. With the number of records routinely stored by businesses, particularly those in the online retail or cloud computing sector, it is easy to see why low sub-limits could be a huge problem if a breach occurs. So check your policies, and call your insurance advisers, to get ahead of these changes in the law in Washington.
Update April 22: The bill has passed and is now awaiting signature by the Governor.
Wednesday, March 11, 2015
Cyber Coverage No Longer a Novelty But Many Concerns Remain
One particularly useful panel took a deep dive into problematic policy language and the limitations of the products currently offered. This is critically important because although cyber coverage is no longer new, the language of the policies is not yet standardized. A few of the many things to look out for are:
- long "waiting periods" for business interruption coverage. Business interruption coverage is "time loss" cover in that the loss amount is calculated (generally speaking) as average sales per hour multiplied by the number of hours of downtime due the covered event. However, some chunk of time (the "waiting period") is routinely excluded as a kind of deductible. Some cyber insurers default to a 24 hour waiting period (an eternity for an many businesses and particularly online retailers) putting the burden on the policyholder to ask for a more reasonable period. According to the panel (and my own experience has shown this to be true) carriers will agree to 12 hours or less - sometimes 8 hours. If your business relies on closing sales around the clock, cutting down the waiting period could mean hundreds of thousands of dollars more in business interruption coverage.
- liability coverage limited to liability for the insured's own wrongful acts. Because so much electronic data is now routinely hosted, handled or safeguarded in some manner by vendors, any kind of strict limitation with regard to who made the "oops" may result in no coverage, even though the insured may be held liable as the owner of the data. The panel discussed several recent data breach incidents in which the error that allowed confidential data to be stolen was committed by one entity, but liability was imposed on another entity (e.g. the Target hack, where intruders gained access through a "phishing" scam on Target's HVAC contractor). Companies need to pay careful attention to the language of their policies and candidly assess their risks associated with vendors and consultants, particularly in the retail and healthcare sectors.
- coverage for fines and penalties. The number of regulatory bodies (state and federal) that are being given authority to issues fines and penalties for data breach violations is growing at a fast clip. Some policies strictly exclude coverage for any kind of fine or penalty, while some do not. Policyholders should examine their current coverage and evaluate whether their current and future coverage needs are being met, depending on the regulatory environment in which they operate.
The upside of the fact that cyber coverage is still issued largely on a "manuscript" basis (that is, without relying on industry-wide forms) is that insurers are sometimes willing to negotiate on policy language even for relatively small accounts, and oftentimes mid-period if circumstances have changed. Careful attention to evolving risks from "cyber" events combined with close examination of your policy language can lead to productive conversations with your broker and carrier and needn't wait until renewal.
* Update: This morning Apple is experiencing a major outage in its iTunes store, among other services. Some are estimating that the six-hour outage has cost Apple $7 million - now that's a serious cyber-business interruption loss (if covered).
Tuesday, December 31, 2013
Target Data Breach Lawsuits Increase Focus on Insurance Coverage for Cyber-Risk
Monday, June 10, 2013
New York investigates insurance companies’ cyber security
Insurers demand a great deal of sensitive information about commercial policyholders in the underwriting process, from social security numbers and driving records of employees, to information on security systems. I will be very interested to see what New York turns up about the cyber security measures, or lack thereof, at the nation's larger insurers.
'via Blog this'