Head of Cyber, Marsh Speciality, Pacific
Picture the scene: Your company outsources its digital marketing — including management of the customer relationship management system with the personal details of thousands of customers — to a startup. The terms and conditions are agreed, and both parties are happy with the negotiated contract.
Months later, your customers’ data is compromised while being handled by the startup.
Who is liable, and to what extent? Who will handle the incident’s aftermath? Whose insurance should cover the losses? Does the startup have suitable insurance to cover costs? And, if so, does your company have the contractual right to recover?
During a cyber incident, the answer to such questions is not always clear.
Amid contractual negotiations over price and service levels, questions of cybersecurity, liability, and insurance can easily slip through the cracks. A lack of contractual clarity can result in later disputes over liability, who/or which insurer should cover the costs, and which company should manage the incident.
This is why effective contractual risk transfer is a key element in negotiations before an event occurs.
Ensuring you are not held responsible for mistakes or errors made by a vendor can provide critical business protection. A contract that clearly and specifically spells out which party is responsible in the event of a cyber loss — before work begins — could save your company time and expense in the event of litigation, and also help to improve crisis management following an incident. It is vital to discuss these issues with legal counsel.
This is particularly relevant for companies exploring outsourcing contracts — for example, if outsourcing to the cloud — or for professional services companies that provide digital services. Keep in mind that contractual negotiations are largely dictated by the relative leverage of the purchaser and provider of the services.
The optimum outcome is to fully transfer risk with an adequate financial backstop, although this is not always realistic. It’s imperative that companies work with legal counsel, who understand cyber and technology risks, before agreeing contractual terms. Many of the core issues are similar to those that underwriters will examine when underwriting a vendor’s own professional indemnity (PI) insurance, such as:
It’s routine to require your vendor to carry insurance for the risks they face that could affect service, including motor, property, general liability, and employer’s liability coverage. In professional or technology service contracts, professional liability is also standard, and increasingly so is cyber insurance.
Insurance requirements should dovetail with contractual requirements and careful analysis of your trading partner. Requiring your vendor to carry insurance ensures it has the financial wherewithal to support its indemnity obligations. For example, there is no point in a vendor accepting unlimited liability for any losses relating to data breaches if it does not have adequate capital, via its balance sheet or insurance, to cover the losses.
Requiring cyber coverage may also increase the likelihood that the vendor has been through a cyber insurance due diligence process, meaning that underwriters have evaluated the vendor’s risks and risk management maturity. In other words, it reduces the chance of the vendor being a “bad risk.”
So what insurance should you require your vendors to have?
Typically, professional indemnity insurance provides vendors with coverage for a failure of their services. Meanwhile, cyber coverage addresses cyber security issues with their network or disclosure of private information.
PI is required if the vendor provides a service, and the policy must cover negligence more generally. Most companies that need PI insurance will bundle the liability elements of cyber coverage into their PI policy, so one policy may satisfy both requirements.
If the concern is a data breach at a vendor that is handling your data, then either PI or cyber coverage may work, depending upon policy language. For caution’s sake, it can make sense to require both, and many tech services companies buy these coverages together.
Companies often start with a standard request ($5 million, $10 million, $20 million, and so on), which depends on their size and the size, by revenue, of the typical vendor contract. Often, the value of a specific vendor contract will provide guidance as to the level of risk and appropriate limit. Other factors to consider include:
Being named as an “additional insured” (AI) has less value in PI/cyber claims, although it is common in other contractually required lines. It would enable an entity to access a policy — and trigger breach cost payments — which would be beneficial in data breach claims where the named insured provides services to the AI and causes the breach.
However, it would be unclear who would pay the retention or manage the process, and who would coordinate with the insurer. Being added as an AI can actually cause problems for the AI, if done incorrectly. For example, almost all policies contain an insured vs. insured exclusion, which could end up barring coverage for an PI claim. Other insurance language could also be used to avoid coverage if the AI has its own policy.
Another consideration is whether to ask for a “right-to-audit” clause from vendors.
Contracts with vendors that touch your client or confidential information should require them to protect the data they handle. Increasingly, contractual language is more than the standard “provide appropriate security controls.” Forward-thinking companies often require standards that can include: segregation of data, limitations on where the data can be housed geographically, and detailed requirements as to security practices.
Right-to-audit language typically allows you to review your vendor’s security practices and procedures, although you are not generally required to do so. This allows you to identify and eliminate risky vendors; support your compliance obligations; and strengthen your security practices and procedures. Like all contracts, your ability to secure this contractual right will depend on the terms of the deal. But the request is becoming more common among larger companies with considerable amounts of personally identifiable information that outsource some or all of their data management services.
It’s as true today as ever that when you outsource services, you do not outsource liability. Clearly establishing indemnity and insurance provisions during contract negotiations with vendors, however, helps to manage cyber liability if a claim does arise.
Head of Cyber, Marsh Speciality, Pacific