Cyber Insurance 2nd Edition


Course Description



  The policies for cyber crime currently being issued are not as plentiful or as affordable as we would like, but they are being issued. As Target discovered, it is not always possible to find the amount of coverage that is desired. Many of the issues currently being experienced will solve themselves with time, of course.


  This course looks at several things: recognizing what cyber risk is, coming to grips with the growth we will surely see in cyber crime, learning what is available in cyber insurance coverage, and working with risk management (an element that is important to insurers). Cyber policies do not have a lot of history yet, so insurers are still determining the extent of their risk. Because they lack the data they would prefer to have for underwriting, exclusions in these policies are plentiful.


  Cyber insurance is a form of liability insurance, making it a property/casualty issue. Some insurers are finding themselves addressing claims from policies that were not intended to cover cyber crime, but if the policy does not expressly exclude cyber losses, they are likely to find themselves paying some of the claims.


  This course covers many issues that insurance producers are probably not familiar with, but they will be faced with many elements of cyber events and need to know what they are about. The course covers identification of cyber events, including losses through credit and debit cards, falsely filed federal tax returns, car theft by invading the computer systems the newer cars have, home invasion by criminals who know how to remotely open doors using home systems, identity theft by breaching data systems, and even breaches of insurers and insurance producer files. Agents themselves are likely to find they are targets of hackers because they gather so much personal information when filling out applications. When agents sell annuity products and long-term care, they are actually mandated to determine suitability issues by asking many financial questions and recording the data. All of this information is desired by hackers, whether for personal financial gain, identify theft (which is still financial gain, or to sell on the black market.


Thank you,

United Insurance Educators, Inc.