Issues to Consider When Evaluating Cyber Coverage in Light of the CCPA and Other State Privacy Laws

Nov 4, 2019

Reading Time : 7 min

Covering costs related to data breach response and recovery and data breach- and privacy-related enforcement actions and litigation presents challenges. Worldwide, as of April 2019, the average total cost of a data breach was $3.92 million.1 The average total cost of a data breach in the United States was $8.19 million.2 The costs of enforcement actions can be similarly significant in terms of monetary penalties and secondary costs. Without adequate coverage, these costs can have long-term effects on a business.

Cyber policies are now a common part of most companies’ insurance portfolios. The policies generally cover five principal areas: (1) costs to manage and respond to a cyber-incident, (2) costs stemming from network interruption, (3) costs for security and privacy liability, (4) costs relating to extortion and (5) costs for media liability or reputational harm. Whether insurers cover all of these areas or all costs within different areas varies from policy to policy. Most policies offer first-party and third-party coverage. First-party coverage applies to losses that are directly sustained by the insured party, such as damage to a company’s own electronic data files. Third-party coverage applies to claims by others against the insured company, such as claims by people who were injured by the insured company’s actions (or inactions).

With the increase in state privacy legislation, particularly the CCPA, many insurance companies are working with clients to also cover certain “compliance” costs arising out of a violation of a privacy-related legal obligation where no underlying cyber incident has occurred. Insurers and insureds alike are also working to understand how the CCPA’s private right of action fits within existing third-party liability coverage and whether and how they may need to expand such coverage. We provide below a few points of guidance for companies to consider as they engage in similar discussions with their brokers and insurers.

Potential Gaps in Cyber Coverage

Companies should consider the following potential gaps, among others, in cyber coverage as they evaluate their policies in the lead-up to the CCPA and in light of other state privacy laws.

  1. “Compliance” Coverage: Not all policies clearly cover regulatory fines that federal or state regulators may impose for a company’s violation of a privacy statute where no underlying cyber incident occurred. Instead, some policies link reimbursement to the existence of a breach and its documentation. With the adoption of laws like the GDPR and the CCPA, some insurance companies are also offering cyber coverage that includes a “compliance” element.

This is important because regulatory fines present significant potential costs. Under the CCPA, state regulatory fines range between $2,500 and $7,500 (intentional) per violation. A breach exposing 10,000 records could, if each record is considered a separate violation, lead to fines of tens of millions of dollars.

Compliance coverage provides protection for regulatory fines where there is no underlying cyber incident. Some insurance companies also offer services to help incentivize compliance, like regulatory readiness assessments.3 Compliance coverage may apply, for example, where a regulator fines a company for failing to timely or properly respond to a consumer (or data subject) request for information. Many companies with a European presence sought similar coverage before the GDPR took effect in May 2018. Companies required to comply with the CCPA should consider doing the same.

  1. Coverage for Litigation Costs: Not all policies cover data breach- and privacy-related litigation costs, and others limit the type of litigation costs covered. The CCPA includes a private right of action that many believe will spawn a new wave of privacy class actions. The CCPA provides consumers a private right of action in the event their personal information is affected by a data breach and certain other conditions are met. Consumers may seek the greater of either actual damages or statutory damages ranging from $100 to $750 per consumer per incident. Defense costs could similarly increase as companies defend against shareholder lawsuits and other related litigation. A cyber policy that covers litigation defense helps a company prepare for and mitigate these costs. Companies should consider policies that include robust third-party liability coverage. They should also write into their policies their outside counsel of choice to ensure there is no dispute down the line as to their ability to hire trusted counsel.
  2. Coverage for Intentional Acts of Employees: Some cyber policies exclude coverage for intentional acts by the insured’s employees. It is important to understand how this limitation may affect coverage for costs related to the access and disclosure of information by an employee not authorized to access such information. Some new state laws expand the definition of a breach to include “access,” not just acquisition, in certain circumstances. For example, the CCPA may be interpreted as expanding the definition of “breach” to include unauthorized access and disclosure. The New York Stop Hacks and Improve Electronic Data Security (SHIELD) Act similarly expands the definition of “breach of the security of the system” to include unauthorized access.
  3. Coverage for Cyber Fraud: Keep in mind that fraud, even if cyber-related, may fall under a separate crime policy. Companies should think through how their cyber and crime policies may interact with regard to recovery of costs related to, for example, fraudulent consumer information requests. Recent reports suggest that companies subject to the GDPR have faced an onslaught of fraudulent data subject requests, which are akin to consumer information requests under the CCPA.4 Companies may want to prepare for a similar situation when the CCPA goes into effect.

Follow Policy Requirements to Ensure Coverage

Beyond potential gaps in coverage, companies should also carefully note additional obligations that they may need to comply with to ensure coverage. Companies should work these obligations into their incident response plans, including by assigning responsibility for the tasks to specific members of their incident response teams. These obligations may include notification obligations or use of insurer-mandated service providers (e.g., a particular cybersecurity forensic firm). Companies should write into their policies their outside counsel of choice to ensure high-quality representation by firms that are familiar with and trusted by their company.

Risk of Insurance Denial of Coverage for Certain Types of Incidents

In the midst of these changes, a few pending cases could lead to troublesome precedent in terms of easing insurance companies’ ability to avoid payment of certain cyber-related claims. The most significant of these cases involves a claim Mondelez (a multi-national company with brands such as Oreo and Ritz Crackers) filed under its property policy related to costs incurred as a result of the NotPetya ransomware attack in 2017. After U.S. government authorities attributed the NotPetya attack to a foreign state actor, Mondelez’s insurer used that attribution to assert that Mondelez’s claim was barred under a war exclusion clause. The parties are now locked in litigation regarding the applicability of the exclusion.

Other potential cybersecurity insurance risk areas include (1) lack of coverage for accidental errors and omissions (as opposed to attacks and unauthorized activity); (2) in cases where there was significant business interruption, some insurers are limiting claims to losses incurred during actual network interruption, not the entire period of business interruption; (3) where the data breach occurs with a third-party contractor or outsourced service provider, some insurance policies do not cover such breaches; and (4) unclear allocation between cybersecurity policy and crime/fraud policy in the case of fraudulent wire transfers originating from business email compromise.

Companies should monitor this and other cyber insurance disputes to ensure they update their policies as necessary.

Conclusion

With the CCPA going into effect in just a few months, companies should reach out to their outside counsel and brokers now to understand what coverage they have, what coverage they think they need and the cost/benefit to buying additional cyber coverage. The following are points companies should consider as they reevaluate their cyber insurance coverage in light of the CCPA and other state privacy laws:

  • Prepare, or ask your broker to prepare, an overview of your current cyber coverage, including whether it includes “compliance” coverage, permits recovery of costs related to an investigation where no underlying cyber incident is discovered (even if no official action is taken by a regulator), covers unauthorized access by employees, includes litigation costs and similar key issues.
  • Ensure you obtain expanded litigation coverage, if you intend to, by January 1, 2020. The CCPA’s private right of action is apparently effective as of that date, although public enforcement of the CCPA will not begin until the earlier of six months after the California Attorney General issues its CCPA regulations or July 1, 2020.
  • Write your outside counsel of choice into your cyber policy. Many insurance companies still provide companies the option of doing so and it can facilitate cost recovery to ensure this is done before an event occurs.
  • Update your incident response plans to incorporate key obligations in your cyber policy to ensure you meet all prerequisites for recovery. Incorporate any mandated service providers into your incident response team, as appropriate. Review the California Attorney General Office’s regulations once released to see if they suggest you may need additional coverage.
  • Monitor developments related to the CCPA, particularly the private right of action, and reevaluate your insurance coverage at the end of 2020 to determine if you should adjust your coverage.
  • Assign someone on your team, or request outside counsel, to monitor federal and state privacy and cybersecurity developments and schedule regular (perhaps quarterly) updates to ensure your team understands any developing requirements.

1 IBM Security, Cost of a Data Breach Report (April 2019), p. 3, available at: https://www.ibm.com/security/data-breach.

2 Id.

3 See, e.g., Insurance Journal, AXA XL Adds Cybersecurity Services to Cyber Insurance Program (Nov. 30, 2018), available at: https://www.insurancejournal.com/news/national/2018/11/30/510695.htm.

4 See The Register, Talk about unintended consequences: GDPR is an identity thief’s dream ticket to Europeans’ data (Aug. 9, 2019), available at: https://www.theregister.co.uk/2019/08/09/gdpr_identity_thief/.

Share This Insight

Previous Entries

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

Data Dive

August 6, 2024

On July 30, 2024, the Senate passed the Kids Online Safety and Privacy Act (S. 2073) via an overwhelmingly bipartisan vote of 91-3 shortly before departing for the August recess.

...

Read More

Data Dive

July 18, 2024

On 12 July 2024, the European Union Artificial Intelligence Act (AI Act or Act) was published in the Official Journal of the European Union (EU), marking the final step in the AI Act’s legislative journey. Its publication triggers the timeline for the entry into force of the myriad obligations under the AI Act, along with the deadlines we set out below. The requirement to ensure a sufficient level of AI literacy of staff dealing with the operation and use of AI systems will, for example, apply to all providers and deployers on 2 February 2025.

...

Read More

Data Dive

July 18, 2024

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

...

Read More

Data Dive

June 11, 2024

In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal organizations using nonfederal systems, (NIST Special Publication 800-171 (SP 800-171), Revision 3). These security requirements are “intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.”1 While these new controls are only applicable to nonfederal entities that agree to comply with the new issuance, Revision 3 signals the next phase of expected security for government contractors.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.