What Does the Travelers Case Really Mean for Cyber Insurance?

Watch the video for the explanation or see below for the spolier.

 

SPOLIER ALERT!

In The Travelers Indemnity Company of America v. Portal Healthcare Solutions, L.L.C., No. 14-1994 (4th Cir. Apr. 11, 2016), the Fourth Circuit held that Travelers was required to cover Portal’s data breach under its Commercial General Liability (CGL) Policy’s Advertising provision. The court’s reasoning was based on the unique facts of this case where Portal had inadvertently placed individuals’ private information on an unsecured server that made it accessible to anyone on the Internet, without any access restrictions.

The court found that making this information available on the Internet was a “publication” of such information and, therefore, was covered by the Advertising provision in the policy which covered the (1) “electronic publication of material that … gives unreasonable publicity to a person’s private life” or (2) “electronic publication of material that … discloses information about a person’s private life.”

______________________

Shawn Tuma (@shawnetuma) is a business lawyer with an internationally recognized reputation in cybersecurity, computer fraud and data privacy law. He is a Cybersecurity & Data Protection Partner at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.

Published by Shawn E. Tuma

Shawn Tuma is an attorney who is internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for nearly two decades. He is a Partner at Spencer Fane, LLP where he regularly serves as outside cybersecurity and privacy counsel to a wide range of companies from small to midsized businesses to Fortune 100 enterprises. You can reach Shawn by telephone at 972.324.0317 or email him at stuma@spencerfane.com.

Leave a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Business Cyber Risk

Subscribe now to keep reading and get access to the full archive.

Continue reading