Strengthen your cyber defense against malware and hackers.

Our team of experts can customize your Cyber Liability policy to cover critical areas. In addition to your technological issues, features to consider also encompass a broad range of scenarios from crisis management and public relations expenses (relative to your security breach) to credit monitoring services and the costs associated with notifying customers and other third-parties of the situation (as required by many states’ laws).

>Cyber Liability for Higher Education (PDF)

>Cyber Liability for Financial Institutions (PDF)

Should your computer system or network fail, this liability coverage offers protection for damages and claims expenses arising out of an actual or alleged act, error or omission, etc. It also includes assessment, remediation, managed security services and business continuity consulting and planning services.

  • The Ever-Changing Landscape of Cyber Risk [ Webinar]

    Arthur J. Gallagher & Co., in conjunction with Lewis Brisbois Bisgaard & Smith LLP and NetDililgence are collaborating on this interactive webinar to discuss the most pressing cyber issues and exposures impacting businesses today. This free, one-hour webinar is designed to engage risk managers, general counsel and IT professionals to think about the importance of managing their cyber risk exposure from a legal, network operations and insurance perspective.

  • Network Security and Privacy Liability - It’s Not Just an IT Issue. [ Webinar]

    Technology has changed the delivery of health care with the push to digitize all health care records. With that type of digital change, the Healthcare community is an increasing target for cybercriminals. Keeping electronic Protected Health Information (ePHI) secure is a challenge for IT and an ongoing concern for HR managers, compliance and finance. For healthcare organizations and practices, the fines and penalties associated with HIPAA and HITECH can be crippling. This recorded webcast will help you understand some of the risks, how to help mitigate them and how to protect your organization's financial health.

Privacy liability addresses issues if an insured fails to protect electronic or non-electronic private or confidential information in their care, custody or control.  Should that progress to privacy regulatory proceedings by federal, state or foreign regulators, your policy could also cover defense expenses, penalties/fines incurred from a regulatory proceeding (prompted by a potential violation of a privacy law from a security breach) and more.

  • Cyber Risk & Privacy Liability: Risky Business? [ Whitepaper]

    Your company depends on computer technology infrastructure to efficiently conduct its day-to-day business, but this growing dependence on information technology also puts your company at risk for exposure known as “cyber risk.”

  • 2013 Cost of Cyber Crime Study: United States [ Whitepaper]

    The Ponemon Institute’s 2013 Cost of Cyber Crime Study: United States is the fourth annual study of U.S. companies. Sponsored by HP Enterprise Security, this year’s study is based on a representative sample of 60 organizations in various industry sectors.

>Are You Exposed to Cyber Risk? (PDF)

As a direct result of an insured’s system security failure, this policy addresses first-party expenses for lost income from a business interruption, loss and/or business restoration expenses that are incurred in the process beyond their normal operating costs. 

  • The Financial Impact of Cyber Risk [ Article]

    In building your organization's cyber risk management program, this article offers a range of key questions to address with your operations, technology and financial teams to consider in your planning.

  • Do You Need a Business Continuity Plan? [ Article]

    More than 70% of companies that do not have a comprehensive business continuity plan fail to recover from a significant business interruption event whether it's from a disaster, cyber attack or other significant business issue. What should you know?

  • U.S. States Probing Security Breach at Experian Unit [ Article]

    (This is an excerpt from article written by Jim Finkle and Karen Freifeld.) Several U.S. states are collaborating on an investigation of a data breach involving a subsidiary of Experian Plc. This reported data breach "exposed social security numbers for some 200 million people". This situation occurred around the same time that the Obama administration announced its intent to "strengthen the government's ability to compel businesses to adequately secure consumers data". Read more about this article through the link below. To view more Cyber Risk whitepapers, webinars or other related cyber issues and liability, visit our Gallagher Cyber Risk web section.

Supplemental E & O coverage can be added to a policy when applicable. No matter what technical actions are taken by your team, there is always a risk gap. The risk gap is the unsecured exposures after security is put in place, and there are two key types of exposures.

  • Controllable exposures have two flaws. Since networks are so complex, it's impossible to consider every risk scenario. Due to business costs and operational resources, all controls and variables cannot be implemented.

  • Uncontrolled exposures are based upon new threats such as viruses. Corporate governance generally requires that these exposures be addressed either by risk transfer or acceptance. Traditional insurance usually has gaps relative to these issues, but cyber insurance can fill most of those gaps.

From an electronic or enterprise level, this policy covers intellectual property (copyright infringement, etc.) and personal injury perils that result from an error or omission (E & O) in content on your website. Specifically, it addresses electronic or enterprise failures to prevent:

  • Network security breaches
  • Unauthorized access or use which could result in destruction or corruption of electronic data
  • The introduction of malicious code
  • Denial of service attacks
  • Identity thefts

This solutions addresses coverage for expenses and/or losses incurred as a result of an extortion threat made against an insured. As a means to avert potential damage, this policy also includes payments made to a party threatening to attack an insured’s computer system.