Frequently Asked Questions about Cyber Insurance

A Resource Created by URMIA and EDUCAUSE

This document contains advice intended for general information only. To learn how cyber insurance applies to your institution, please contact your institution's risk management office or chief information officer. This document is not legal advice. For legal advice, please contact your legal counsel.

Cyber risk refers to the risk of financial harm to an organization resulting from the failure or disruption of its computer systems. Alternatively, it is the risk companies face from their handling data and relying on technology in their day-to-day operations. As used by insurers, "computer systems" is typically defined broadly to include many IT systems.

Insurers view colleges and universities—with their culture of openness and information sharing—as highly susceptible to cyber risk. Data breaches can turn into high-visibility problems, such as identity theft, electronic stalking, compromise of health data, theft of intellectual property (either the institution's own or that of another entity), and other liabilities.*

Cyber risks at educational institutions encompass all users, including faculty, students, and staff. Colleges and universities are also a treasure trove of confidential information, with financial records of parents, healthcare records of students and staff, credit card data, etc. The types of computer systems in use at a modern-day institution are varied and include both on-campus systems controlled by the institution and off-campus (cloud) systems managed by third parties. Examples of the varied computer systems include equipment for remote monitoring of and access to infrastructure systems like boilers and HVAC systems, to stadium scoreboards, to centrally managed classroom video display computers. News stories about ransomware attacks plaguing colleges and universities and third-party security breaches that impact campus operations are not uncommon.

FBI Internet Crime Statistics from 2018, 2019, and 2020

In 2018, the FBI received 351,937 complaints, which was a new all-time high. In 2019, that number jumped to 467,361, a roughly 33% increase over 2018. In 2020, with the onset of the pandemic and the new landscape for businesses and cyber criminals, the FBI saw a whopping 791,790 complaints, a roughly 69% increase over 2019. The three major types of attacks reported were phishing scams, non-payment/non-delivery scams, and extortion (ransomware).

* Multiple higher education institutions have now confirmed they were victims of data theft related to a security flaw in file transfer software sold by IT security company Accellion. See Lindsay McKenzie, "Secure File Sharing Compromises University Security," InsideHigherEd, April 7, 2021.

Cyber insurance is a financial risk transfer product that helps protect organizations from cyber and IT risks by transferring those risks away from the insured. While cyber insurance does cover some direct organizational losses (like covering the costs of forensic services or data breach services), it is primarily intended to protect organizations from lawsuits and regulatory claims that the organization failed to secure and protect the data entrusted to it.

Crime insurance focuses on protecting organizations from direct losses caused by employees and third parties. Crime insurance is specifically designed to cover costs related to the loss of tangible property and money. This type of insurance will reimburse an organization for the loss of property or money due to theft, forgery, and fraud, among other crimes

The lines between cyber insurance and crime insurance become blurred when an organization suffers a loss that involves computer fraud and loss of data. In these situations, understanding the terms of your institutional policies is important.

Today, insurance coverage exists for variety of potential losses and liabilities caused by cyber risks. Insurance for a particular institution could include some or all of the following:

Breach and event response coverage: This coverage covers the following costs resulting from a privacy breach: forensic and investigative services; breach notification services (including legal fees, call center, mailing of materials, etc.); identity and fraud monitoring expenses; and public relations and event management.

Regulatory coverage: The Securities and Exchange Commission, the Federal Trade Commission, the Department of Homeland Security, and dozens of other local, state, federal, and non-US regulators now look at all aspects of cyber risk. This coverage reimburses the costs to defend an action by regulators due to a privacy breach, but there is no limitation as to what caused the privacy breach. Coverage would apply to a failure of security that causes a privacy breach, someone losing a laptop, or someone emailing a document to the wrong person. Coverage also applies to nongovernmental regulations, in particular the payment card industry and its PCI standards. It also covers any fines and penalties imposed by a court or regulator or imposed by certain nongovernmental organizations, if insurable by applicable law.

Liability coverage: Liability insurance protects the policyholder and insured individuals from the risks of liabilities imposed by lawsuits and similar claims. It protects insureds in the event they are sued for claims that come within the coverage of the insurance policy. Liability insurance may also cover some costs incurred by the policyholder in responding to the claim or lawsuit, but not costs the policyholder incurs to fix the issue. Common types of cyber insurance liability coverages include:

  • Privacy liability: This covers defense and liability for failure to prevent unauthorized use/access of confidential information (including the failure of others to whom you have entrusted data). Coverage generally extends to personally identifiable information and confidential information of a third party.
  • Security liability: This covers defense and liability for the failure of system security to prevent or mitigate a computer attack, including but not limited to the spread of a virus or a denial of service. Failure of system security includes failure of written policies and procedures addressing technology use.
  • Multimedia liability: This covers defense and liability for media tort from online publication, including libel, disparagement, misappropriation of name or likeness, plagiarism, copyright infringement, or negligence in content. Coverage extends to the institution's own websites, email, and media activities such as blogging and tweeting. For example, if a blog contains libelous information and claim for compensation is made against the institution, this coverage applies.

Internal expenses and court attendance cost to defend claims: Under a cyber insurance policy, the insurer may have the right and duty to defend any claim brought against an insured or may indemnify the insured for reasonable costs incurred by the insured to defend a claim. An insured will generally be required to cooperate with the insurer in the defense of the claim and provide to the insurer all information and assistance that the insurer reasonably requests, including attending hearings, depositions, and trials and assistance in effecting settlements; securing and giving evidence; obtaining the attendance of witnesses; and conducting the defense of any claim covered by the policy.

Cyber extortion: Cyber extortion usually takes the form of a ransomware attack, whereby a cyber criminal will encrypt a victim institution's files and/or threatens the release of sensitive data unless a ransom is paid. Cyber extortion coverage covers the costs of consultants and monies, including cryptocurrencies, for threats related to interrupting systems and releasing private information, as well as the rebuilding of such systems after an attack.

Institution's loss of income or extra expenses due to:

  • Security breach: Business interruption coverage covers the loss of income and extra expenses resulting from a business interruption due to a security event or an unintentional or unplanned outage. Typically, the insured entity must satisfy a waiting period or meet a damage threshold before coverage will apply.
  • Security breaches of contingent third parties: Many polices now recognize the interdependence of businesses and contain contingent business interruption provisions. Contingent business interruption coverage covers an insured's loss of income and extra expense due to a security event that interrupts the service of an entity not owned, operated, or controlled by the insured but that is relied upon to conduct business. For example, if a ransomware attack prevents a payroll service from processing an institution's payroll and the institution incurs costs to manually provide the payroll, the extra cost of doing so would be covered.
  • System failures: A system failure generally means any unintentional and unplanned outage of a computer system. A system failure may occur, for example, after an organization implements a system patch that proves to be incompatible with existing functions, resulting in an unplanned outage.

Data replacement costs due to a security breach: This coverage applies to the costs incurred by the insured to replace, restore, or recollect digital assets from written records or from partially or fully matching electronic data records due to their alteration, corruption, or destruction from a network operations security failure.

Deceptive fraud transfer: Deceptive fraud transfer is a type of cyber crime that occurs when a person is tricked into transferring funds to an unauthorized person or account. In these schemes, cyber criminals often hack into a company's network to send official-looking company emails to induce company employees to transfer funds to a purportedly legitimate account. Deceptive fraud transfer schemes are sometimes called social engineering fraud. This may be an optional endorsement under some policies but is typically not covered under the more basic policies.

Cyber insurance policies may include some or all of the following key components:

  • Media in the control of others: Cyber insurance may cover unencrypted media in the care or control of third-party processors.
  • Events occurring during policy period but discovered afterward: Coverage under a cyber insurance policy is triggered, in part, by an insured's report of a claim to the carrier. Depending on the wording of the policy, it may cover events that occurred during the policy period but were discovered after the expiration of the policy period. Under a "claims made and reported form," for example, a claim must be made and written notice of the claim must be received by the insurer during the policy period or, if applicable, during any extended reporting period that may extend the discovery period for a period of time beyond the expiration of the policy.
  • Coverage for privacy breaches other than electronic or computer related: In addition to a breach of a computer system, personal data may be compromised when paper records are lost, stolen, or improperly handled, resulting in an unauthorized disclosure. For example, a privacy breach may occur when personal data paper records are not properly disposed.
  • Errors and omissions—negligence or breach of contract: This encompasses legal defense costs or indemnification resulting from a lawsuit or dispute with customers when cyber events prevent companies from fulfilling contractual obligations or delivering services to customers.*
*Billee Elliott McAuliffe, Benjamin J. Siders, and Melissa G. Powers, "Cyber Insurance: The Coverage(s) You May Need For a Breach," LewisRice, August 6, 2020.

Cyber insurance policies protect some or all of the following types of data:

Personal health information (PHI): Also referred to as protected health information, PHI is any information that contains individually identifiable health information and generally includes any part of a patient's medical record such as health status, provision of health care, or payment for health care. This applies both to on-campus student health clinics (including psychological counseling centers) and to academic medical centers where patient data are integrated into core systems (as well as individual medical devices that may store patient scan or other data). Federal law, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA), sets forth various requirements—and penalties—regarding the handling of PHI.

Personally identifiable information (PII): PII is information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. PII generally includes an individual's name, address, telephone number, Social Security number, account numbers, account balances, account histories, and passwords. It includes information that is subject to the Family Educational Rights and Privacy Act (FERPA).

Payment card information (PCI): This includes the personal information held by a payment card brand to process a payment card transaction. PCI also refers more broadly to the payment card industry. PCI-DSS (Payment Card Industry Data Security Standards) refers to the rules, regulations, standards, or guidelines adopted or required by the payment card brand or the Payment Card Industry Data Security Standards Council relating to data security and the safeguarding, disclosure, and handling of protected information.

Confidential third-party/research information: In many cyber insurance policies, sensitive third-party data such as trade secrets, designs, forecasts, methods, formulas, and records that are in the care, custody, or control of an insured may be considered "confidential" or "protected" information. A privacy event may occur under a cyber insurance policy when an unauthorized disclosure of confidential or protected third-party information occurs. For example, if a professor's research database containing information on the social behaviors of individuals who have AIDS is breached and the data are taken, insurance may cover the cost of claims made against the institution and the professor by those whose information is violated.

Data hosting, outsourced electronic processing, or data storage: Organizations often rely on third parties, such as cloud providers and data centers, to perform critical business functions. Coverage under a cyber insurance policy may extend to a computer system operated by a third party for the benefit of the insured. For example, an insurance policy may consider a third party's computer system operated solely for the benefit of an insured as part of the "insured's computer system." Cyber insurance policies may also extend coverage to a "shared computer system," which is a computer system, other than an insured's computer system, operated for the benefit of an insured by a third party under written contract with an insured and may include such systems as data hosting, cloud services or computing, co-location, data back-up, data storage, data processing, platforms, software, and infrastructure-as-a-service.

Like other insurance policies, cyber insurance policies exclude coverage for certain losses. Exclusions are usually grouped together in a section of the policy, though coverage may also be excluded or limited by the definitions or policy language. Typical exclusions include claims attributable to or arising from war, operation of a nuclear facility, intentionally dishonest or criminal acts, breach of contract, theft of trade secrets, unfair trade practices, and employment practices. Insurance carriers exclude these risks because they are unwilling to insure them, because coverage may exist in another policy, or because coverage may be against public policy. Cyber insurance policies also typically exclude coverage for any incident or claim that arises from or is based on a willful, intentional, deliberate, malicious, fraudulent, dishonest, or criminal act or omission committed by the insured. The general intent of this exclusion is to prevent the insured from receiving a financial benefit for committing an unlawful or dishonest act. Each cyber insurance policy is different, and it is important to read the policy terms carefully to understand what is and is not covered. Depending on the policy form and grant of coverage, additional exclusions can include losses due to a lack of security measures, vicarious liability, loss of electronic device, and intellectual property (note: some policies allow for an endorsement to protect companies from losses of intellectual property).*

*See "Common Exclusions in Cyber Risk Insurance," SecureNow, Insuropedia, July 6, 2021

Common institutional insurance policies such as general liability, directors and officers, property, and crime insurance may provide limited coverage. Insurance coverage for cyber risks has evolved over time. Before there was specific privacy and data security coverage, organizations may have turned to their general liability, errors and omissions, or crime policies for coverage. In some instances, these more traditional policies provided the necessary coverage, but in other cases they did not or were very limited in coverage, leading to a more tailored product designed specifically to mitigate cyber risks. For example, under a commercial general liability policy, electronic data are generally not considered tangible property and are not covered under the property damage provisions. A modern cyber insurance policy, however, may cover the costs incurred to replace, restore, or recollect digital assets from written records. Should multiple insurance policies cover the same claim, the order in which insurance policies will respond is determined by the "other insurance" provisions in the policies.

The legal doctrine of sovereign immunity protects some governmental entities, including some public educational institutions, from being sued. State legislatures, however, have passed laws waiving immunity for certain actions, defining limits for the immunity provisions, and setting forth procedures to bring a claim. For example, although suit may be brought against a public entity, the law may prohibit punitive damages or place a cap on a monetary award. This may mean that, in some situations, private individuals may not be able to sue a state or public institution for a data breach or may be required to follow certain procedures in order to sue a public institution for a data breach.

Like organizations in other industries, institutions of higher education face cyber risk exposure. On average, higher education institutions warehouse volumes of sensitive data and are also susceptible to losses related to business interruptions. Since not all cyber risk can be minimized through robust processes or technical controls, risk transfer is a viable means of limiting the scope of an educational institution's exposure. Institutions should note that commercial insurance markets are cyclical, meaning that insurers are more or less willing to provide coverage and policy limits on cost-effective terms. This cyclicality is due partly to supply and demand (as insurers, for their own reasons, choose to become more invested in this coverage line or market for higher education), partly to their claims payment history in this coverage, headlines that insurers perceive as making the risks more likely to turn to losses going forward, technological changes that affect the risks, and policyholders' willingness to invest in risk mitigation techniques to differentiate themselves in the insurance marketplace.

In addition, institutions should also note that commercial insurance companies are also growing more savvy about understanding institutional computer systems and requiring that those systems meet basic information security protective thresholds. As a condition of insurance, insurers may require a campus to demonstrate compliance with an industry best practice information security framework (such as NIST or ISO). They may also require an institution to demonstrate a particular information security control, such as the use of multifactor authentication across the campus network or institutional computer systems. Cyber carriers are also providing more risk mitigation resources and are partnering with third-party training and risk mitigation vendors, sometimes included in their programs and offered at a discount to their customers.

While there is no outright federal or state law mandating that higher education institutions carry cyber insurance, officials may nevertheless determine that carrying such coverage is in the best interests of the institution. The EDUCAUSE Core Data Service shows that in 2019, 82% of responding institutions indicated that their institution had purchased cyber liability insurance. Benchmarking the purchase of cyber insurance typically is based on comparisons with organizations of a similar industry and revenue size. Insurance brokers may have benchmarking information based on client data. Other sources are surveys of peer institutions.

Best practices for obtaining a cyber liability insurance quote include the following:

Work with an experienced insurance broker: An effective broker should have a strong, comprehensive grasp of the scope of an organization's cyber risk; understand and explain how this risk is quantified; provide recommendations on insurance carriers or policies that might be a good fit for the organization; and obtain appropriate coverage and favorable pricing. Selecting a broker with cyber insurance expertise may be essential to securing cyber insurance that addresses the institution's needs. Because insurance companies use policy forms for all kinds of organizations, colleges and universities should review policy language to look for terms and provisions that are unclear in the higher education context and address these prior to purchasing the policy.

Conduct a security risk assessment to reduce premiums: A risk assessment provides greater transparency into the organization's cyber security controls and helps the organization identify vulnerabilities and potentially make changes to areas in need of improvement, which, if properly implemented, could result in a premium reduction. The EDUCAUSE Core Data Service reports that, as of 2018, 16% of responding institutions have conducted an information security risk assessment for insurance purposes. Another form of assessment that insurers will look favorably upon is for the institution to conduct tabletop exercises to gauge their own response to critical incidents and then to implement improvements for the gaps identified.

Implement security controls that reduce premiums: Cohesive and interconnected corporate practices geared around people, process, and technology-related cyber security improvements reduce risk and can lead to lower premiums. Restricting network access to certain users is an example of a solution that impacts all three categories: a corporate policy mandates the network access restriction; the restriction is executed by an information security or information technology team; and one of the policy's core objectives is to limit human error.

Organizations, working with an experienced insurance broker and risk management professionals, must evaluate their own cyber risk appetite and what steps they intend to take to mitigate those risks. Cyber insurance is not a "fix all" for all risk mitigation policies and procedures, and it has limitations. For example, it is not intended to cover the theft of money/funds (this is what a dedicated crime policy does). Cyber insurance also generally does not cover the impact on institutional reputation, the devaluation of a trade name, or the loss of intellectual property. The administrative burden to deal with the incident or prosecute an insurance claim is also not covered. The cyber insurance market can be volatile. Generally speaking, purchasing cyber insurance requires more effort in responding to the insurer's need for information than buying other kinds of insurance, and there is still a dearth of data other than that related to PII-related breaches.

Cyber insurance is a companion piece or safety net that sits alongside and complements organizational cyber security controls. It is not intended to substitute for technical, process, or human-related cyber security (e.g., ongoing training and awareness of end users of cyber security protocols). That said, if organizational computing systems or processes are victimized or otherwise fail to prevent a cyber attack, cyber insurance helps minimize the resulting financial impact.

Key organizational cyber security stakeholders (the CISO, CIO, CPO, CFO, GC, CRO) should be fully engaged in all cyber insurance–related purchase discussions, given that—similar to discussions about predictive analytics and other quantification or comparative tools provided by insurance brokers, carriers, or outside consultants—these stakeholders are best positioned to understand the scope of their organization's cyber risk and provide recommendations on how much risk transfer may accordingly be necessary.

Other implications of purchasing a cyber liability insurance policy include the following:

Improved cyber security through pre-breach services: Many cyber insurance policies include free or discounted services that can be used by policyholders before a breach occurs in order to reduce the likelihood or severity of a future cyber incident. These services can include online security assessments, access to cyber security expertise through consulting services or white papers, and cyber security awareness training programs for users. Many insurers also maintain lists of preapproved vendors or third-party partners who provide discounted services, such as incident response planning, tabletop exercises, and compliance assessments. Using pre-breach services that are included as part of a cyber insurance policy can be a cost-effective way for an institution to improve its cyber security posture.

Assistance to institution in making security decisions: Some insurance brokers and carriers have in-house personnel who provide security enhancement recommendations on matters such as third-party vendor exposure, measuring organizational compliance with voluntary frameworks such as NIST and ISO, and gauging the potential financial impact of business interruption losses.

Adding cyber insurance to insurance requirement imposed on contract partners: For organizations with an extensive supply chain or reliance on third-party vendors, requiring cyber insurance is highly advisable. Higher education institutions might add cyber insurance to contracts with partners or might find that contract partners increasingly require that the institution maintain cyber insurance. Special consideration should be given to any system containing PII—a number of systems store regulated PII, and writing this into the third-party contract might be advisable.

Insurer requirements to encrypt portable media/computing devices: Insurers do not necessarily require encryption of data "at rest" or in process, but organizations that can demonstrate this capacity to insurers either on an insurance application or during the underwriting process may lead the insurers to consider the institution less risky, which may result in a premium discount.

In the immediate aftermath of a cyber event, an organization with cyber insurance should immediately notify its insurer and broker. Prompt notification is preferred but, in any event, should not occur beyond the requirements specified in the insurance policy. Prompt reporting is highly recommended even if the organization—for any of a number of reasons—decides not to file a claim.

Many insurers have a counsel panel and other preapproved vendors that the organization can utilize in the aftermath of a breach for remedial, legal, and other costs. To avoid delays and maximize organizational operability, it is highly recommended that the organization have a preexisting relationship with each vendor or at least have some measure of familiarity with them prior to a breach. If an organization wants to use a vendor that is not on an insurer's counsel or preapproved vendor list, this usually is not a problem so long as the insurer is made aware prior to an incident. *

* EDUCAUSE maintains several resources to assist institutions in responding to an information security incident. See the Incident Response and Management Toolkit.

Typically, three parties are involved in the claims handling process: the insured organization's defense counsel, broker claims assistance, and the insurer's claims team. During the claims process, the organization's insurance broker provides related assistance and advocacy and assists with settlement strategies and responding to coverage questions. Generally speaking, a major factor for organizations when deciding between insurers is claims-paying history.

A benefit of cyber insurance is access to people who are knowledgeable about the various laws related to cyber events. Inadvertent mishandling of an event by the institution usually will not void insurance, but best practices dictate engaging the insurance company in the process of addressing the event that led to the potential claim.

Following an event leading to a claim, the institution and insurance company will evaluate what went wrong and consider alternatives to mitigate the risk in the future. The insurance company may urge certain strategies, but its ability to mandate is a function of its willingness to continue as the insurer and whether the market provides the insurer leverage.

In some instances, a breach may occur in a country or jurisdiction without legal requirements to notify—in such cases, the institution may want to act out of a sense of doing what is right or to reduce potential liability, even though the institution has no legal requirement to act. The cost of these actions may be covered by insurance, even if they are not legally required.

Insurers tend to raise premiums following a loss, but the ability to do so depends on market conditions. Involving the insurance broker can help explain the steps taken to remediate the risk and emphasize the positive qualities of the institution.

Download Resources

Acknowledgments

This resource was created as a collaborative effort between members of the

University Risk Management and Insurance Association (URMIA) and EDUCAUSE. We hope that this resource will be useful to you as your institution considers cyber liability risk insurance. The following individuals participated in the working group that wrote this publication:

  • Rick AmRhein, Chief Information Officer, Valparaiso University
  • Todd Beekley, Senior Associate Director of Enterprise Risk Management, University of Cincinnati (contributed to original version of FAQ)
  • Brian Kelly, Cybersecurity Program Director, EDUCAUSE
  • Blake Lovvorn, Assistant Director Risk Management, University of Central Florida (contributed to original version of FAQ)
  • Robert Parisi, Managing Director and Cyber Product Leader, Marsh (contributed to original version of FAQ)
  • Andy Weisskopf, Information Security Officer, Binghamton University
  • Lisa Zimmaro, Associate Vice President, Risk Management & Treasury, Temple University
  • Joanna Grama, Associate Vice President, Vantage Technology Consulting Group
  • Glenn Klinksiek, Resource and Education Manager, URMIA (original version)
  • Gary Langsdale, Education Manager, URMIA (2021 version)

The working group especially thanks Robert Parisi for his contributions of the technical description of cyber insurance.

About the University Risk Management and Insurance Association
The University Risk Management and Insurance Association (URMIA) is an international nonprofit educational association serving colleges and universities. Our core purpose is to promote the advancement and application of effective risk management principles and practices in institutions of higher education. Our membership includes thousands of professionals at more than 600 institutions of higher education and 100 companies supporting those institutions. For more information, please visit urmia.org.

About the EDUCAUSE Cybersecurity Program
The EDUCAUSE Cybersecurity Program offers a number of resources to help colleges and universities develop and mature their information security and privacy programs.

© 2021 EDUCAUSE. This work is licensed under a Creative Commons BY-NC-ND 4.0 International License.