Risk & Business Magazine Spectrum Insurance Spring 2017 | Page 6
CYBER RISK COVERAGE
Business
Interruption
Meets Cyber
Risk Coverage
COSTANTINO P. SURIANO AND BRUCE R. KALINER
A
s more businesses come to
realize that cyber attacks pose
a serious threat to business
operations, revenue streams
and contingency planning,
the market is starting to expand and
develop new products to address business
interruption, or BI, resulting from a cyber
attack. Some of the more common cyber
attacks against businesses include denial-
of-service, brute force (to obtain passwords),
insertion of malware or malicious code,
ransomware, backdoor attacks and social
engineering. This article provides a
primer on the issues that may arise when
the traditional concept of first-party BI
coverage is married to cyber coverage.
BI coverage is a time-element coverage
offered under first-party property policies.
In the first-party context, for BI coverage
to be implicated, there must be insured
direct physical loss or damage by a covered
cause of loss that causes a necessary
interruption of the insured’s operations,
either wholly or partially as specified in
the policy. Once these conditions are met,
then the actual loss sustained is measured
to determine the loss of business income
from the interruption.
It is important to remember that first-
party property policies do not traditionally
6
extend property loss or damage to
electronic data, as data is not considered a
physical or tangible object subject to loss
or damage. When BI coverage is offered for
cyber policies, the direct physical loss or
damage requirement may be substituted
with an electronic data driven event — a
specified type of cyber attack.
THE SCOPE AND
ELEMENTS
OF WHAT
CONSTITUTES A
CYBER ATTACK
IN THE POLICY
IS THEREFORE
OF CRITICAL
IMPORTANCE.
In other words, what triggers BI coverage
for a network attack? As noted above,
BI coverage was originally intended for
physical loss and is now being imported
into the ethereal and nonphysical world.
As part of a triggering event for BI coverage,
there must be a direct causal connection
between the cyber attack and the
interruption of business and loss of revenue.
For an active attack, where an adversary
or perpetrator destroys or alters data that
brings down the computer system, or a
denial of service takes place and business
operations cease, the causal connection
to any business loss should be fairly
straightforward to establish.
However, the causal connection is less
clear in a situation involving a passive
network attack, when a computer system
is infiltrated but the perpetrator is only
gathering data or exploring the system, and
no data is disturbed, altered or destroyed.
In such a situation, a network attack took
place and remedial measures are necessary,
but computer operations may continue
uninterrupted while the security of the
system is being restored and any malicious
software is neutralized. Although the
cyber policy may respond and pay for the
expenses to restore the network security
under other coverages, a BI loss has not
been established inasmuch as there would
be no interruption of operations.
Another scenario could involve a passive
attack combined with a public disclosure
that an insured’s network has been