CYBER INSURANCE

Слободан Јовановић

DOI Number
10.22190/TEME1703823J
First page
823
Last page
837

Abstract


Over the previous two decades, evеryday life of the society, fundamental rights, social interactions and economy have become largely dependant on the continuous work on the computers and communication technologies. Cyber risks pose everyday threat to the uninterrupted operation and service provision in the public and private sectors, and their occurrence may cause catastrophic consequences to property and people. This necessitates adequate IT risk management and appropriate contract framework of insurance. This paper deals with the analysis of different definitions of the information risks and a few terms connected with information risks, information risk exposure, reasons for cyber insurance, and object of cyber insurance by analyzing insurance policies from London market.

Keywords

Information Risk, Internet, Insurance, Property, Liability.

Full Text:

PDF (Cрпски)

References


Agrawal, T., Henry, D. & Finkle, J. (2014, October 2). JP Morgan hack exposed data of 83 million, among biggest breaches in history. Reuters. Retrieved from http://www.reuters.com/article/us-jpmorgan-cybersecurity-idUSKCN0HR23T20141003.

Allianz Global Corporate & Specialty SE. (2015). A Guide to Cyber Risk. Munich: Allianz Global Corporate & Specialty SE.

Association of British Insurers. (2015). Cyber insurance to become a business essential within the next decade. Retrieved from https://www.abi.org.uk/News/News-releases/2015/05/Cyber-insurance-to-become-a-business-essential-within-the-next-decade.

Beck, D., Siemens, R. (2012). Cyber Insurance – Mitigating Loss from Cyber Attacks. Perspectives on Insurance Recovery Newsletter. New York: Pillsbury Winthrop Shaw Pittman LLP. Retrieved from http://www.pillsburylaw.com/publications/cyber-insurancemitigating-loss-from-cyber-attacks.

Bolton, D. (2016, May 16). Hackers and Government surveillance are making people abandon the Internet, survey finds. Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/hacking-cybersecurity-cyberattack-surveillance-nsa-cia-gchq-internet-use-effect-a7031926.html.

CRO Forum. (2014). Cyber resilience: The cyber risk challenge and the role of insurance. Amsterdam: CRO Forum & KPMG Advisory N.V.

Cumming, L. (2011, July 17). Art Theft and the Case of the Stolen Turners by Sandy Nairne – review. The Guardian. Retrieved from https://www.theguardian.com/books/2011/jul/17/art-theft-case-stolen-turners-review.

Cyber-attack. (2016, April 17). In Wikipedia, the free encyclopedia. Retrieved May 20, 2016, from https://en.wikipedia.org/wiki/Cyber-attack.

European Commission. (2013, Ferbuary 7). Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions – Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN(2013) 1 final. Brussels: European Commission.

European Cybersecurity Industry Leaders. (2016). Recommendations on Cybersecurity for Europe. Forum International de la Cybersécurité. Lille: European Cybersecurity Industry Leaders.

Griffin, A. (2016a, May 4). Instagram hacked by 10-year-old, who wins $10,000 prize for finding way to delete comments. Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/instagram-hacked-by-10-year-old-who-gets-10000-prize-for-finding-way-to-delete-users-comments-a7012496.html.

Griffin, A. (2016b, May 10). iPhone app tells users if phones have been hacked into or secretly jailbroken. Independent. Retrieved from http://www.independent.co.uk/life-style/gadgets-and-tech/news/iphone-app-tells-users-if-phones-have-been-hacked-into-or-secretly-jailbroken-a7022236.html.

Hiscox PLC. (2015). Cyber and data Policy wording, WD-PIP-UK-CD(2) 13388 05/15.

HM Government & Marsh Ltd. (2015). UK Cyber Security: The Role of Insurance in Managing and Mitigating the Risk. London: Marsh Ltd.

Insurance Information Institute. (2014). Cyber Risks: The Growing Threat. New York: Insurance Information Institute.

Кривични законик [Criminal Code], Службени гласник РС. Бр. (85/2005), 88/2005, 107/2005, 72/2009, 111/2009, 121/2012, 104/2013 и 108/2014.

Lemos, R. (2014, September 19). Home Depot estimates data on 56 million cards stolen by cybercriminals. Ars Technica. Retrieved from http://arstechnica.com/security/2014/09/home-depot-estimates-data-on-56-million-cards-stolen-by-cybercrimnals/.

Lloyd’s Cyber Core Data Requirements. (n.d.). Retrieved from http://www.lloyds.com/

news-and-insight/risk-insight/emerging-risks-team/cyber-core-data-requirements, May 26, 2016.

Malicious Software (Malware). (n. d.). In Techopedia. Retrieved May 26, 2016, from https://www.techopedia.com/definition/4015/malicious-software-malware.

Nakashima, E. (2011, August 3). Report on ‘Operation Shady RAT’ identifies widespread cyber-spying. The Washington Post. Retrieved from https://www.washingtonpost.com/national/national-security/report-identifies-widespread-cyber-spying/2011/07/29/gIQAoTUmqI_story.html.

QBE Insurance (Europe) Limited. (n. d.). QBE Cyber Response: Cyber and Data Security Insurance Policy, PCYB020414 QBE Cyber Response (QBE PI 14 CR).

Rawlings, P. (2015). Cyber Risk: Insuring the Digital Age. Legal Studies Research Paper No. 189/2015. London: Queen Mary University of London, School of Law.

Securities and Exchange Commission. (2011). CF Disclosure Guidance: Topic No. 2 – Cybersecurity. Retrieved from http://www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm.

The Institute of Risk Management. (2014). IRM Cyber Risk: Executive Summary. London: The Institute of Risk Management.

Trautman, L. (2016, March 25). Is Cyberattack the Next Pearl Harbor? North Carolina Journal of Law and Technology, Vol. 18, 2017 Forthcoming. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2711059, May 27, 2016.

UK Department for Culture, Media & Sport and Ed Vaizey MP. (2016). Two thirds of large UK businesses hit by cyber breach or attack in past year. London: UK Department for Culture, Media & Sport and Ed Vaizey MP. Retrieved from https://www.gov.uk/government/news/two-thirds-of-large-uk-businesses-hit-by-cyber-breach-or-attack-in-past-year.

Закон о електронским комуникацијама [Electronic Communications Act], Службени гласник РС. бр. (45/2010).




DOI: https://doi.org/10.22190/TEME1703823J

Refbacks

  • There are currently no refbacks.


© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804