Cyberinsurance policy rethinking risk for the Internet age

"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--

Detalles Bibliográficos
Otros Autores: Wolff, Josephine, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Cambridge, Massachusetts : The MIT Press [2022]
Edición:1st ed
Colección:Information Policy
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009689915306719
Tabla de Contenidos:
  • Intro
  • Contents
  • Series Editor's Introduction
  • Acknowledgments
  • 1. Introduction: A Market-Driven Approach to Cybersecurity
  • I. History of Cyberinsurance
  • 2. Breach on the Beach: Origins of Cyberinsurance
  • The Development of Auto Insurance
  • Flood Insurance: "A Tool That Should Be Used Expertly or Not at All"
  • "An Irresistible Target for Financial Knaves and Buccaneers"
  • Early Cyberinsurance Policies
  • Data Breach Notification Laws
  • SEC Guidance on Cyber Risks
  • II. Cybersecurity Claims Under Non-Cyber Coverage
  • 3. "The Hackers Did This": Data Breach Lawsuits and Commercial General Liability Insurance
  • Negligent Cybersecurity and Liability for Data Breaches
  • Zurich v. Sony: Pandora's Box
  • Innovak International Inc. and Indirect Publication
  • Rosen Hotels &amp
  • Resorts and Coverage for Breach Notification Costs
  • 4. "The Point of No Return": Computer Fraud Insurance and Defining Cybercrime
  • Intervening Events and Immediate Causes: Brightpoint v. Zurich
  • Hacking, Unauthorized Access, and Pestmaster v. Travelers
  • Phishing, Ambiguous Definitions, and American Tooling v. Travelers
  • "Armed with a Computer Code": Medidata Solutions v. Federal Insurance Company
  • Overlapping Coverage and National Bank of Blacksburg v. Everest
  • 5. "Insurrection, Rebellion, Revolution, Riot": NotPetya, Property Insurance, and War Exclusions
  • Property Insurance and Open-Peril Coverage
  • "War in the Only Sense That Men Know and Understand It": War Exclusions and Pearl Harbor
  • "A Most Unusual and Explicit Contract": Terrorism and Overlapping Coverage
  • "The Special Meaning of War": The Legacy of Pan Am
  • Mondelez, NotPetya, and Cyberwar
  • No Claw Backs
  • III. Cyber Coverage and Regulation
  • 6. "The Big Kahuna": Stand-Alone Cyber Coverage
  • Incomplete and Inconsistent Data
  • Interconnected and Systemic Risks.
  • Moral Hazard and Preventive Measures
  • Cyber Risk Insurance Partnerships
  • The Fallacy of the Stand-Alone Model
  • 7. "What Is the Point of Collecting Data?": Global Growth of Cyberinsurance and the Role of Policymakers
  • The Cybersecurity Policy Boom
  • Cyberinsurance Policy Efforts in the United States
  • Cyberinsurance in the European Union
  • Cyberinsurance in China
  • Emerging Cyberinsurance Markets: Brazil, India, and Singapore
  • Policy Approaches to Cyberinsurance
  • 8. Conclusion: Is Cyber Risk Different?
  • Notes
  • Chapter 1
  • Chapter 2
  • Chapter 3
  • Chapter 4
  • Chapter 5
  • Chapter 6
  • Chapter 7
  • Chapter 8
  • References
  • Index.