Spring 2020 Gavel 268650 SBAND Gavel Magazine_web | Page 33

Quantifying Cyber Risk-Related Damages As demonstrated by its broad definition, the complexity of cyber risk makes for complicated policies and customer expectations. One consideration involves external threats resulting in data breaches. Compromised data may or may not entail subsequent damages or malicious activity against the victim(s). While a firm or organization is always hurt reputationally and financially by a breach, it’s harder to determine how individual victims should be handled and how their damages should be incorporated into a proactive response. In comparison to other kinds of operational losses, the losses associated with cyber risk are both financial and reputational. The damages stemming from cyber risk are fairly nebulous, and incorporating the full scope of the public’s loss and response to a breach is even trickier. If it’s difficult for cyber experts to encapsulate it accurately without leaving anything out, it’s even harder for an insurance company that’s trying to put a price tag on it or an insured who wants the best coverage at the lowest possible price. In the growing realm of data breaches, how does one pinpoint which breach led to which attack or subsequent set of damages for individuals? In the wake of the Equifax breach, for example, millions of U.S. citizens panicked over having their personal information stolen. Many of them appeared to believe this was the first and only time their information had ever been breached, and that if they did end up becoming victims, this breach would be responsible. The fact is, the majority of individuals affected by the Equifax breach probably had already had their information compromised at least once by a previous breach of some kind. If you become a victim of identity theft, it is impossible to say with any certainty which data breach, if any, led to it. (Maybe it wasn’t a data breach at all, but an error on your part that led to information being compromised.) While Equifax’s response to its breach was lacking and many of the affected individuals were unwilling participants in having Equifax store their information to begin with, it is still true that assigning blame to any one data breach is not feasible. If someone had their identity compromised as a result of a data breach that occurred in 2015, but only suffered identity theft in 2018, and blamed the Equifax breach, how could it be determined with any certainty or fairness who was responsible and which insurance policy should cover the loss? Identity theft is not a joke; millions of families suffer it every year. But when it comes to assigning blame, it’s truly anyone’s guess. Factoring in victim damages as a result of an organizational breach is another source of ambiguity and confusion when it comes to cyber liability insurance. how significant? How does a law firm measure the potential client damages in the wake of a breach, and how should a cyber liability policy be applied when the value of data differs and the greatest loss is arguably reputational? When data breaches cause reputational and financial damage, can a cyber liability insurance policy adequately account for ongoing remediation efforts and possible compensation? Potential future losses, many of them unknown until they occur, pose another serious problem when it comes to the value of cyber liability insurance and its part in counteracting cyber risk. As the management of cyber risk becomes more regulated at a national level and technology continues to adapt and expand, insurers are also placed at a great disadvantage. The attention brought to cybersecurity issues in the media, paired with the very public fallout of large-scale data breaches and events, makes for a tempestuous legal environment, especially when current laws and regulations are fairly minimal. Given all the variables in play — the cost of insurance policies, the associated application requirements, the pressures of growing regulations and requirements — small businesses and firms especially will be faced with an ever-increasing set of hurdles. Insurers likewise will have to quickly adapt and adjust policies to reflect changing policy and cybersecurity requirements. For the remainder of this article, I will discuss the security assessment aspects of obtaining coverage, insurance as part of a proactive approach, and the incentivizing of cybersecurity investments. The Role of the Security Assessment In my experience, it is a requirement of all insurance companies offering cyber liability coverage that prospective insureds either provide recent security assessment results or pay up front for onsite security risk assessments and consulting. Depending on the company, security assessments can be strenuous or relatively broad, but either way this requirement poses costs that need to be factored into the In addition to the accountability problem, it’s also very difficult to assess potential future damages. When client data is personally identifying and permanent, such as a Social Security number, the potential for damages is lifelong. But what about data that doesn’t fall under this umbrella? For a law firm, a breached email account can cause significant financial and reputational damages. But SPRING 2020 33