{"id":21390,"date":"2024-02-13T16:25:06","date_gmt":"2024-02-13T16:25:06","guid":{"rendered":"https:\/\/www.insurancejournal.com\/?p=760596"},"modified":"2024-02-13T16:25:06","modified_gmt":"2024-02-13T16:25:06","slug":"viewpoint-the-cyber-risk-pendulum","status":"publish","type":"post","link":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/2024\/02\/13\/viewpoint-the-cyber-risk-pendulum\/","title":{"rendered":"Viewpoint: The Cyber Risk Pendulum"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.insurancejournal.com\/app\/uploads\/2024\/02\/bigstock-Cyber-Security-Data-Protection-287211133-1-580x346.jpg\"><\/p>\n<ul class=\"nav nav-tabs tabs tabs-entry\">\n<li class=\"active\"><a href=\"https:\/\/www.insurancejournal.com\/news\/national\/2024\/02\/13\/760596.htm\">Article<\/a><\/li>\n<li><a href=\"https:\/\/www.insurancejournal.com\/news\/national\/2024\/02\/13\/760596.htm?comments\" rel=\"nofollow\">0 Comments<\/a><\/li>\n<\/ul>\n<div class=\"article-content clearfix\">\n<p class=\"cj-logo\">Privacy risk is so 2014, right?<\/p>\n<p>Ten years ago, numerous retail and healthcare companies were hit with data breaches related to the exposure of credit card or healthcare data. Given many data breach claims, which included fines by state attorney generals and the payment card Industry, the cyber insurance market focused on privacy risk.<\/p>\n<div class=\"bzn bzn-sized bzn-intext\">\n<ins data-revive-zoneid=\"79\" data-revive-topics=\"cyber\" data-revive-companies data-revive-block=\"1\" data-revive-id=\"36eb7c2bd3daa932a43cc2a8ffbed3a9\"><\/ins> <\/div>\n<p>This focus remained until 2017, when ransomware claims developed into more substantial matters, triggering large business interruption losses for carriers. Underwriters accordingly focused on ransomware exposure to minimize the potential for business interruption claims.<\/p>\n<p>However, in 2024, with new state privacy laws and renewed interest from the plaintiffs\u2019 bar, carriers are once again seeing privacy claims, based on biometric, pixel, or chat technology. While ransomware has not gone away, attacks have evolved from network encryption to the theft and ransom of consumer or confidential corporate information. The cyber pendulum has swung back to privacy risk.<\/p>\n<figure id=\"attachment_321939\" aria-describedby=\"caption-attachment-321939\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.claimsjournal.com\/app\/uploads\/2024\/02\/Snyder-Frenier_Stephanie.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-thumbnail wp-image-321939\" src=\"https:\/\/www.claimsjournal.com\/app\/uploads\/2024\/02\/Snyder-Frenier_Stephanie-150x150.jpg\" alt width=\"150\" height=\"150\"><\/a><figcaption id=\"caption-attachment-321939\" class=\"wp-caption-text\">Stephanie Snyder Frenier<\/figcaption><\/figure>\n<p>While all 50 states have data breach notification laws, many states have passed comprehensive privacy bills following the model set by the California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA).<\/p>\n<p>According to the <a href=\"https:\/\/iapp.org\/resources\/article\/us-state-privacy-legislation-tracker\/\">International Association of Privacy Professionals<\/a>, and at the time of this writing, five states have active privacy laws, eight have passed laws that will go into effect within the next two years and 17 other states have active bills. With new state privacy laws, there is a greater ability for state regulators to fine companies who violate privacy provisions. Additionally, many state privacy laws allow for a private right of action for certain violations, which has the potential to increase overall claims costs.<\/p>\n<p>Over the past several years there has been increased activity from the plaintiffs\u2019 bar around biometric, pixel, and chat technology. While Illinois\u2019 Biometric Information Protection Act (BIPA) was enacted in 2008, there has been more litigation activity since 2018, with several key decisions made during 2023 that will impact future BIPA cases. BIPA includes a private right of action as well as a statutory-damages provision, keeping potential large damage awards firmly on plaintiffs\u2019 firms\u2019 radars.<\/p>\n<p>Within the last two years, use of website user-tracking technology \u2013 such as pixel, chat, session replay, website software development kit, or pen-registers \u2013 has spawned litigation by plaintiffs\u2019 firms based on the Video Privacy Protection Act and the California Invasion of Privacy Act. Like BIPA, these acts allow for a private right of action as well as statutory damages, which have the potential to raise the claims price tag for carriers.<\/p>\n<div class=\"bzn bzn-sized bzn-intext-2\">\n<ins data-revive-zoneid=\"162\" data-revive-topics=\"cyber\" data-revive-companies data-revive-block=\"1\" data-revive-id=\"36eb7c2bd3daa932a43cc2a8ffbed3a9\"><\/ins> <\/div>\n<p>This activity forms a backdrop to the continued frequency and severity of ransomware claims. Corvus Insurance reported in January, based on data collected from ransomware leak sites, that <a href=\"https:\/\/www.corvusinsurance.com\/blog\/q4-ransomware-report\">ransomware activity was up 69%<\/a> in 2023, based on prior year totals. Carriers also report that severity remains an issue. According to Coalition, average ransomware demands in the first half of 2023 were <a href=\"https:\/\/info.coalitioninc.com\/rs\/566-KWJ-784\/images\/Coalition_2023-Claims-Mid-Year-Update.pdf\">up 47% over the previous six months<\/a>, and 74% over the prior year.<\/p>\n<p>While ransomware was historically used to encrypt networks, threat actors have pivoted in recent years to theft of customer or confidential corporate information, and holding that data for ransom, with the threat of publishing it on the dark web. In many instances, there may be a double extortion by threat actors with ransoms both to regain access to the network as well as to stolen data.<\/p>\n<p>In this environment, carriers are refining their underwriting to address the potential for losses. In 2024, there is a greater focus on controls related to \u201cwrongful collection\u201d coverage \u2013 the collection of data in a manner that could run afoul of privacy regulations \u2013 whether it be on a state or federal level. Several carriers have introduced supplemental applications with questions that focus on consent regarding data collection practices and the use of website user-tracking technology. Underwriters remain concerned about security controls related to ransomware losses, and most carriers require a ransomware supplemental application as a part of the submission process.<\/p>\n<p>As the cyber pendulum has swung back to privacy risk, underwriting preference has swung accordingly with regards to industry. While in prior years carriers focused on ransomware losses and the associated business interruption, \u201cbrick and mortar\u201d industries fell out of favor. However, in the current environment, these industries are again preferred by underwriters, while industries that are information holders \u2013 such as healthcare, retail, and financial institutions \u2013 cause underwriters greater concern due to the potential for privacy litigation.<\/p>\n<p>As a pendulum never stops moving, cyber risk will continue to swing, with the potential for new areas for claims such as spoofing attacks using Generative AI, attacks on critical infrastructure, or even cyber war.<\/p>\n<p><em>Snyder Frenier is senior vice president, business development leader with CAC Specialty\u2019s Professional &amp; Cyber Solutions practice. She has more than 18 years of experience in the insurance industry, with a focus on cyber insurance and technology errors and omissions.<\/em><\/p>\n<p class=\"tagtag\"> <span class=\"tagtag\">Topics<\/span> <a href=\"https:\/\/www.insurancejournal.com\/location\/california\/\" class=\"btn btn-sm btn-primary tagtag\">California<\/a> <a href=\"https:\/\/www.insurancejournal.com\/cyber\/\" class=\"btn btn-sm btn-primary tagtag\">Cyber<\/a> <\/p>\n<\/p><\/div>\n<div class=\"article-poll\" data-post=\"760596\">\n<div class=\"article-poll-vote\">\n<p>Was this article valuable?<\/p>\n<\/p><\/div>\n<div class=\"article-poll-feedback voted-no\">\n<form class=\"feedback-form\">\n<p>Thank you! Please tell us what we can do to improve this article.<\/p>\n<p> <textarea placeholder=\"Enter your feedback...\"><\/textarea> <button type=\"submit\" class=\"submit\" disabled>Submit<\/button> <button class=\"cancel\">No Thanks<\/button> <\/form>\n<\/p><\/div>\n<div class=\"article-poll-feedback voted-yes\">\n<form class=\"feedback-form\">\n<p>Thank you! <span class=\"percent\"><\/span>% of people found this article valuable. Please tell us what you liked about it.<\/p>\n<p> <textarea placeholder=\"Enter your feedback...\"><\/textarea> <button type=\"submit\" class=\"submit\" disabled>Submit<\/button> <button class=\"cancel\">No Thanks<\/button> <\/form>\n<\/p><\/div>\n<div class=\"article-poll-more-articles\">\n<p class=\"thank-you-text\">Here are more articles you may enjoy.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"author-byline clearfix\">\n<div class=\"author-byline-content\">\n<h4 class=\"author-byline-name\"> <small>Written By<\/small> Stephanie Snyder Frenier <\/h4>\n<p class=\"author-byline-bio\"> Stephanie Snyder Frenier is SVP, business development leader with CAC Specialty\u2019s Professional &amp; Cyber Solutions practice. She engages with clients and prospects to develop bespoke cyber and technology errors &amp; omissions risk transfer solutions, while also supporting marketing and sales strategy. <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"subscribe-banner subscribe-banner-in-content-2\">\n<div class=\"content\">\n<h4>Interested in <em>Cyber<\/em>?<\/h4>\n<p>Get automatic alerts for this topic.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Article 0 Comments Privacy risk is so 2014, right? Ten years ago, numerous retail and healthcare companies were hit with data breaches related to the exposure of credit card or healthcare data. Given many&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":21391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[2,1],"jetpack_featured_media_url":"https:\/\/blog.lifeinsurance-orleans.ca\/wp-content\/uploads\/2024\/02\/viewpoint-the-cyber-risk-pendulum.jpg","_links":{"self":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts\/21390"}],"collection":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/comments?post=21390"}],"version-history":[{"count":0,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/posts\/21390\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/media\/21391"}],"wp:attachment":[{"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/media?parent=21390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/categories?post=21390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lifeinsurance-orleans.ca\/index.php\/wp-json\/wp\/v2\/tags?post=21390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}