Insights
Publications

Winery, Vineyard Cyber Attack Risk Grows With Web-Connected Systems

4/28/2017 Articles
North Bay Business Journal

In the internet of things (IoT), new opportunities for efficiency continually bring new cyber risk. If a device in your winery or vineyard connects to the internet, it is vulnerable. And so is the rest of the system connected to it.

You should consider whether your insurance coverage would cover its losses and liabilities, should you undergo a cyber attack or failure of your systems that leaves your business or your customers compromised.

So what can companies do to manage these exposures? They should deliberately consider their risks and whether their current insurance programs cover those risks. They should not assume they are covered. In many cases, it might not be so clear.

Traditional insurance policies may provide insurance in some scenarios. For example, you might suffer a property loss because of a cyber attack. Such an attack could cause irrigation sensors to fail, leading to vine damage, or harm stored wines, if refrigeration controls fail.

Your property insurance may well cover it, if the policy is of the all-risk variety. But if you have a policy that specifies the perils such as fire, flood etc., it is possible that you’re not covered for property losses resulting from a cyber attack.

Cyber Liability Insurance

Similarly, your company very likely carries commercial general liability (CGL) insurance. There has been a lot of activity in the courts recently about whether a company is entitled to a defense from its CGL insurer against class-action lawsuits arising from data security breaches. Unfortunately, those coverage cases have not yielded a clear answer. And CGL policies will not cover the costs that a company incurs to investigate and respond to a data security breach anyway.

A number of insurance companies now issue specialized cyber insurance policies. Each insurer’s policy form offers different coverage and restrictions. Additionally, the forms are lengthy, very complex and often negotiable. For these reasons, the help of a good knowledgeable broker or insurance-coverage counsel is important to help you understand what a policy covers and what other options may be available.

Here are some scenarios to consider.

Third-Party Attack

When personally identifiable information is taken from a third-party vendor’s computer system (i.e., a credit card processor), you are legally responsible to notify your customers of the event. While a cyber insurance policy could cover you for losses due to the attack on a third-party system, some policies will only cover you for an intrusion on your own computer system or on hardware that you control.

As a result, it is important to understand whether you rely on third-party vendors to collect or store personally identifiable information and, if so, whether your cyber insurance policy would cover you in such an event.

Credit Card Issuance Costs

Another risk, closely related to credit card transactions, is PCI DSS (Payment Card Industry Data Security Standard) assessments for data security breaches. If there is a breach, the banks will have to issue new credit cards, and you may be responsible for the expense.

Your cyber insurance policy can cover assessments made against you. If you are running credit card transactions, this would be a coverage to confirm is in your policy.

Business-Interruption Loss

If you suffer a business interruption or denial-of-service (DDoS) cyber attack, a typical cyber insurance policy might cover you for one of two kinds of loss: A direct business interruption loss resulting from a loss you’ve suffered because of an intrusion into your computer system and a contingent business-interruption loss resulting in a loss of revenue because of an intrusion into a third-party’s system on which you rely.

However, these coverages are not standard and quickly evolving, so it is important to understand your possible losses in such an event and whether your insurance policy would cover them.

Ransomware

A cyber insurance policy will also cover cyber extortion or ransomware attacks. It is common in these policies to cover the investigation and response to cyber extortion attempts and even extortion payment – as long as you have the insurance company’s consent before you make that payment.

New risks will continue to appear. The more you know about your business’ unique risk profile, the better prepared you will be to mitigate those risks and negotiate the appropriate level of insurance to protect you.

Fundamentals of Security

Rick Doten, cyber and information security chief for the Crumpton Group LLC, suggests that you mitigate threats right at the start by observing the fundamentals of good security: “Know what data and systems are critical to your business, and where sensitive data is located; know what threat scenarios would be harmful to your business; prioritize your risks; and keep your systems properly maintained.”

The latter is one of two basic pieces of security advice: Keep your systems up to date, and use different passwords for every site and application you visit. Since generating and remembering multiple unique passwords is complicated, he advises using a password manager.

Companies should follow that advice: strengthen their IT defenses, and keep an eye on all their insurance policies. Policy form wording and coverage are changing rapidly, and what’s covered today may not be in next year’s renewal. Conversely, new coverage may be available next year that aren’t available now.

Firm Highlights

News

50 Farella Lawyers in 2023 The Best Lawyers in America® and the Best Lawyers: Ones to Watch in America™; 4 Lawyer of the Year Awards

Read More
Publication

Are Communications With Your Insurance Broker Privileged Under New York Law?

Discussions with an insured’s insurance broker are often an important part of the negotiation process for insurance claims. Brokers can provide valuable insights on the drafting and underwriting of the insurance policy as well...

Read More
News

Farella Attorneys Named to 2022 Northern California Super Lawyers and Rising Stars

Thirty-four Farella Braun + Martel lawyers were named to the Super Lawyers and Rising Stars lists of top attorneys in Northern California for 2022. Super Lawyers: Carly Alameda – Business Litigation George Argyris &ndash...

Read More
News

Legal Experts Say Opioid Coverage Disputes Far From Over

Shanti Eagle was quoted in Law360 's article "Legal Experts Say Opioid Coverage Disputes Far From Over."  Read the article here (subscription required).

Read More
Publication

Caught in the Crossfire — How will the war exclusion affect commercial policyholders?

The war exclusion has received a lot of attention over the past year, particularly since Russia invaded Ukraine in February. Policyholders’ concern that insurers will assert the exclusion as a basis to deny coverage...

Read More
News

2022 Cannabis Insurance Market Update

Tyler Gerking was quoted in  PropertyCasualty360 's article "2022 Cannabis Insurance Market Update."  Read the full article here (subscription required). Watch the webinar "Cyber Insurance for the Cannabis Industry" here .

Read More
News

Chambers USA 2022 Recognizes Farella Braun + Martel Lawyers, Practices

Farella Braun + Martel is pleased to announce that Chambers USA has recognized 14 lawyers and 6 practice areas in the legal directory’s 2022 edition. Individual California and Western U.S. Rankings: Sarah Bell &ndash...

Read More
Publication

Using Multi-Factor Authentication as a Prerequisite to Cyber Liability Coverage

Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently...

Read More
Publication

Maximizing Your Insurance Coverage for Data Privacy Liability

With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...

Read More
Publication

Continuing Use of CGL Policies to Cover Data Breach Losses

Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance...

Read More