J.S. Held Strengthens Forensic Accounting and Financial Investigations Expertise and Expands Suite of Services in Canada with Acquisition of ADS Forensics
Read MoreWhile cyber was incorporated in some general liability policies (GL) of the 1980s, the first cyber standalone policy was written in 1997 through AIG. Though groundbreaking, as it was the first to address cybersecurity, it was a third-party liability policy only.¹ According to Statista, standalone worldwide cyber policy premiums have grown from $2.5B in 2014 to over $7.5B in 2020.²
Business Interruption (BI) coverage is now being offered in a high percentage of standalone cyber insurance policies (cyber policies). One of the significant events in cyber insurance in recent years has been the addition of more meaningful business interruption insurance for cyber-related events. It is common to see standalone cyber coverage that either combines first-party business interruption coverage with data breach liability or includes only first-party business interruption. It generally covers partial or complete business interruption following a cyberattack or technical failure.
This paper addresses the most common and material BI measurement issues and the importance of a technical evaluation of the incident.
Just like with fire, water, and other physical damage losses, it is necessary to perform a technical evaluation of the incident and any compromised equipment to understand the scope of damages, impact, period of recovery, and identify any upgrades or betterments that are wrapped into claim submissions.
Why is a technical evaluation of a cyber claim important to the BI evaluation?
It is imperative for this information to be gathered at the onset of a loss evaluation so that insurance carriers can understand how the loss applies to their policies and also understand the total exposure. The technical evaluation and the BI can be analyzed concurrently with respective experts.
In this paper, business interruption is considered to equal the loss of net income plus continuing cost not earned. Cyber coverage, related to cyber risk, available in the marketplace is far from standard. There is a vast array of cyber products, each with its own terms and conditions, which may vary dramatically from insurer to insurer, even from policy to policy, underwritten by the same insurer.
There are many types of incidents and scenarios that are classified as a cyber claim. They can include:
With cyber claims, it’s imperative to understand the important BI measurement and computational issues. Based on our research of a sampling of over 2,500 business interruption losses, the top three BI measurement issues between as claimed and as calculated, by issues in order of frequency, are:
The first step for a forensic accountant in a BI computation is to determine the “But For” sales. “But For” the event, the sales would have been “X” amount. The policy wording is similar in many cyber policies when compared to property policies, but not identical. The common wording in cyber policies includes:
"Due consideration shall be given to the prior experience of the business and the insured business before the beginning of the security failure and to the probable business an insured could have performed had no security failure occurred.”
The policy goes on to state the insured shall not profit from favorable business conditions caused by the event (paraphrased).
With sales projections related to cyber, forensic accountants will be looking at the entire company, as opposed to just one particular location or region, which is usually the case with a fire or hurricane. An example of why this is important can be understood by comparing the different margins of an e-commerce company and brick and mortar store. In order to be most accurate, sales and margins need to be analyzed individually by business group.
The focal point of determining the period of indemnity (POI) is usually the cyber technical experts working with the insured and claims adjuster that determine the POI. Accountants may have an ancillary role but are not the project lead.
The POI denotes the time period for which indemnity or compensation is payable under a business interruption policy. The POI is one of the most critical components of quantifying the business interruption loss.
A technical evaluation by a cyber technical expert is key to understanding how the incident will have an impact on the POI. All situations are unique and require technical expertise to evaluate. Some questions that must be answered are:
After a cyber event, it is common that upgrades or changes are made to systems and infrastructure to prevent a future incident. Identification of these costs and scopes are important because they may increase the claim value and period of recovery. Therefore, they may need to be adjusted. This can include:
In first-party BI losses, it is common to measure the POI based on a theoretical period of restoration. This is necessary when an insured decides to make improvements and betterments and not to rebuild. Cyber losses realize a similar scenario. Frequently the insured will choose to enhance their security network after a breach. The “beefing up” of the network may take additional time, which is not generally recoverable under the BI time period. This is an opportunity for a potential difference in opinion upon various experts/professionals as to how long it would have taken to “rebuild” as was.
Saved (avoided) costs are required to be computed to determine the lost net income. Frequently, the most significant decision made by a business owner is whether they continue to pay non-productive employees during the outage period or have a layoff. The cyber BI coverage may or may not cover the cost of these employees. In traditional coverage, ordinary payroll is identified as non-essential payroll. This has largely been adopted by the insurance market to mean hourly payroll.
Completing both a technical and BI analysis related to a cyber loss is a combination of science and art.
This process includes:
As simple as it may sound, each cyber claim will likely have a unique twist that is not comparable with prior events. Therefore, it is important to remember these three key points:
Seeking the assistance of cyber technical experts and a reputable accountant with knowledge and experience with cyber claims is key. Together, these experts will make the mechanics of the BI computation easier for all involved.
Cyber coverage represents a new insurance market. Much like boiler and machinery plus employee practices liability insurance, cyber policies are here to stay. While BI is not a new concept, BI coverage within a standalone cyber policy is.
We would like to thank Peter Hagen and Troy S. Bates for providing insight and expertise that greatly assisted this research.
Peter Hagen is an Executive Vice President in J.S. Held’s Forensic Accounting – Insurance Services Practice. He specializes in the measurement of financial damages and his primary clientele has been insurance companies and attorneys. For insurance companies he is most often retained to measure and consult on the reasonableness of sizable business interruption claims. For attorneys he is retained as an expert to give his opinion on financial damages. Peter has testified as an expert witness for both plaintiff and defendant firms and has concentrated the energy, telecommunications, healthcare, and commercial airlines industries. Before joining J.S. Held, Peter was CEO and name partner at the forensic accounting firm HSNO (Hagen, Streiff, Newton & Oshiro).
Peter can be reached at [email protected] or +1 972 980 5063.
Troy Bates is an Executive Vice President in J.S. Held’s Equipment Consulting Practice. With over 31 years of experience in equipment loss consulting, Troy specializes in equipment damage assessment, feasibility of repair versus replacement, comparable replacement analysis/estimates, actual cash value estimates, production impact resolution, and claim evaluation. He has evaluated a wide variety of equipment and systems including, but not limited to, information technologies, electronics, medical equipment, telecommunications, and other specialized equipment. Formerly a Principal at Werlinger & Associates, which was acquired by J.S. Held in 2019, Troy has provided technical consulting services for commercial property insurance claims to carriers throughout North America, Europe, Asia, and the Middle East.
Troy can be reached at [email protected] or +1 714 660 9171.
¹ 100 AIG Stories. The First to Tackle Cyber Risk. (2019) https://www.100.aig/stories/first-tackle-cyber-risk
² Statisca.com 2020 Estimated Value of Cyber Insurance Premiums Written Worldwide from 2014 to 2020. https://www.statista.com/statistics/533314/estimated-cyber-insurance-premiums/
Whether a commercial roof with massive expanses that cover acres of area or a single-family residential structure with two roof slopes, combining expertise with cutting-edge technology better supports the scientific analysis of roofing matters. ...
Fuel station technology is evolving rapidly. Fuel dispensers, underground storage tank monitoring systems, and point of sale systems are closely integrated and reliant on each other for the station to function. If one component of...
The concept of indemnification for loss is at the core of property insurance reimbursement. Insurance policies are designed to put the policyholder in the same position he or she would have been in had no...