Insurance coverage for cyber losses[dagger]

Society's dependence on computers requires our constant vigilance against cyberattacks and the spread of malware. When a loss occurs, industry and commerce will look to an outside "responsible party" in the sense of contract or tort liability, but not all losses will be resolved in th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:FDCC quarterly 2003-07, Vol.53 (4), p.357
Hauptverfasser: Traub, Richard K, Leff, Robert M
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 4
container_start_page 357
container_title FDCC quarterly
container_volume 53
creator Traub, Richard K
Leff, Robert M
description Society's dependence on computers requires our constant vigilance against cyberattacks and the spread of malware. When a loss occurs, industry and commerce will look to an outside "responsible party" in the sense of contract or tort liability, but not all losses will be resolved in that fashion. a culprit cannot be found, or, if found, the culprit is "judgment proof," victims will seek first-party coverage from their insurers. They will also seek protection under their third-party liability policies. First party policies cover damages incurred by policyholders to their own property. Third-party policies are designed to cover losses to third parties for which the insured may be liable. In order to obtain coverage for damage resulting from cyber losses, an insured must establish the elements of triggers and occurrence. These concepts are discussed in detail. In addition to the foregoing trigger and occurrence requirements, there are policy exclusions that may bar coverage.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_201222819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>441380241</sourcerecordid><originalsourceid>FETCH-proquest_journals_2012228193</originalsourceid><addsrcrecordid>eNpjYeA0NDUx0bW0NDHnYOAqLs4yMDA0MzMy5GTQ9swrLi1KzEtOVUjOL0stSkxPVUjLL1JIrkxKLVLIyS8uTi2OTklMT08tiuVhYE1LzClO5YXS3AxKbq4hzh66BUX5haWpxSXxWfmlRXlAqXgjA0MjIyMLQ0tjohQBALbsMII</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>201222819</pqid></control><display><type>article</type><title>Insurance coverage for cyber losses[dagger]</title><source>Business Source Complete</source><creator>Traub, Richard K ; Leff, Robert M</creator><creatorcontrib>Traub, Richard K ; Leff, Robert M</creatorcontrib><description>Society's dependence on computers requires our constant vigilance against cyberattacks and the spread of malware. When a loss occurs, industry and commerce will look to an outside "responsible party" in the sense of contract or tort liability, but not all losses will be resolved in that fashion. a culprit cannot be found, or, if found, the culprit is "judgment proof," victims will seek first-party coverage from their insurers. They will also seek protection under their third-party liability policies. First party policies cover damages incurred by policyholders to their own property. Third-party policies are designed to cover losses to third parties for which the insured may be liable. In order to obtain coverage for damage resulting from cyber losses, an insured must establish the elements of triggers and occurrence. These concepts are discussed in detail. In addition to the foregoing trigger and occurrence requirements, there are policy exclusions that may bar coverage.</description><identifier>ISSN: 1544-9947</identifier><language>eng</language><publisher>Tampa: Federation of Defense &amp; Corporate Counsel, Inc</publisher><subject>Business interruption insurance ; Computer viruses ; Computers ; Data integrity ; Decision making ; Endorsements ; Insurance coverage ; Insurance policies ; Insurance premiums ; Liability insurance ; Malware ; Marine insurance ; Network security ; Policyholders ; Property damage ; Provisions ; Software ; Third party administrators</subject><ispartof>FDCC quarterly, 2003-07, Vol.53 (4), p.357</ispartof><rights>Copyright Federation of Defense &amp; Corporate Counsel, Inc. Summer 2003</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Traub, Richard K</creatorcontrib><creatorcontrib>Leff, Robert M</creatorcontrib><title>Insurance coverage for cyber losses[dagger]</title><title>FDCC quarterly</title><description>Society's dependence on computers requires our constant vigilance against cyberattacks and the spread of malware. When a loss occurs, industry and commerce will look to an outside "responsible party" in the sense of contract or tort liability, but not all losses will be resolved in that fashion. a culprit cannot be found, or, if found, the culprit is "judgment proof," victims will seek first-party coverage from their insurers. They will also seek protection under their third-party liability policies. First party policies cover damages incurred by policyholders to their own property. Third-party policies are designed to cover losses to third parties for which the insured may be liable. In order to obtain coverage for damage resulting from cyber losses, an insured must establish the elements of triggers and occurrence. These concepts are discussed in detail. In addition to the foregoing trigger and occurrence requirements, there are policy exclusions that may bar coverage.</description><subject>Business interruption insurance</subject><subject>Computer viruses</subject><subject>Computers</subject><subject>Data integrity</subject><subject>Decision making</subject><subject>Endorsements</subject><subject>Insurance coverage</subject><subject>Insurance policies</subject><subject>Insurance premiums</subject><subject>Liability insurance</subject><subject>Malware</subject><subject>Marine insurance</subject><subject>Network security</subject><subject>Policyholders</subject><subject>Property damage</subject><subject>Provisions</subject><subject>Software</subject><subject>Third party administrators</subject><issn>1544-9947</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2003</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpjYeA0NDUx0bW0NDHnYOAqLs4yMDA0MzMy5GTQ9swrLi1KzEtOVUjOL0stSkxPVUjLL1JIrkxKLVLIyS8uTi2OTklMT08tiuVhYE1LzClO5YXS3AxKbq4hzh66BUX5haWpxSXxWfmlRXlAqXgjA0MjIyMLQ0tjohQBALbsMII</recordid><startdate>20030701</startdate><enddate>20030701</enddate><creator>Traub, Richard K</creator><creator>Leff, Robert M</creator><general>Federation of Defense &amp; Corporate Counsel, Inc</general><scope>0-V</scope><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>4T-</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AM</scope><scope>8AO</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ALSLI</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGRYB</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>K60</scope><scope>K6~</scope><scope>K7.</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M0O</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20030701</creationdate><title>Insurance coverage for cyber losses[dagger]</title><author>Traub, Richard K ; Leff, Robert M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_2012228193</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Business interruption insurance</topic><topic>Computer viruses</topic><topic>Computers</topic><topic>Data integrity</topic><topic>Decision making</topic><topic>Endorsements</topic><topic>Insurance coverage</topic><topic>Insurance policies</topic><topic>Insurance premiums</topic><topic>Liability insurance</topic><topic>Malware</topic><topic>Marine insurance</topic><topic>Network security</topic><topic>Policyholders</topic><topic>Property damage</topic><topic>Provisions</topic><topic>Software</topic><topic>Third party administrators</topic><toplevel>online_resources</toplevel><creatorcontrib>Traub, Richard K</creatorcontrib><creatorcontrib>Leff, Robert M</creatorcontrib><collection>ProQuest Social Sciences Premium Collection</collection><collection>Global News &amp; ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>Docstoc</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Criminal Justice Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Social Science Premium Collection</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Criminology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>ProQuest Criminal Justice</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>FDCC quarterly</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Traub, Richard K</au><au>Leff, Robert M</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Insurance coverage for cyber losses[dagger]</atitle><jtitle>FDCC quarterly</jtitle><date>2003-07-01</date><risdate>2003</risdate><volume>53</volume><issue>4</issue><spage>357</spage><pages>357-</pages><issn>1544-9947</issn><abstract>Society's dependence on computers requires our constant vigilance against cyberattacks and the spread of malware. When a loss occurs, industry and commerce will look to an outside "responsible party" in the sense of contract or tort liability, but not all losses will be resolved in that fashion. a culprit cannot be found, or, if found, the culprit is "judgment proof," victims will seek first-party coverage from their insurers. They will also seek protection under their third-party liability policies. First party policies cover damages incurred by policyholders to their own property. Third-party policies are designed to cover losses to third parties for which the insured may be liable. In order to obtain coverage for damage resulting from cyber losses, an insured must establish the elements of triggers and occurrence. These concepts are discussed in detail. In addition to the foregoing trigger and occurrence requirements, there are policy exclusions that may bar coverage.</abstract><cop>Tampa</cop><pub>Federation of Defense &amp; Corporate Counsel, Inc</pub></addata></record>
fulltext fulltext
identifier ISSN: 1544-9947
ispartof FDCC quarterly, 2003-07, Vol.53 (4), p.357
issn 1544-9947
language eng
recordid cdi_proquest_journals_201222819
source Business Source Complete
subjects Business interruption insurance
Computer viruses
Computers
Data integrity
Decision making
Endorsements
Insurance coverage
Insurance policies
Insurance premiums
Liability insurance
Malware
Marine insurance
Network security
Policyholders
Property damage
Provisions
Software
Third party administrators
title Insurance coverage for cyber losses[dagger]
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T15%3A13%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Insurance%20coverage%20for%20cyber%20losses%5Bdagger%5D&rft.jtitle=FDCC%20quarterly&rft.au=Traub,%20Richard%20K&rft.date=2003-07-01&rft.volume=53&rft.issue=4&rft.spage=357&rft.pages=357-&rft.issn=1544-9947&rft_id=info:doi/&rft_dat=%3Cproquest%3E441380241%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=201222819&rft_id=info:pmid/&rfr_iscdi=true