Threatonomics

The State of Complex Claims: Data Privacy Legislation and Lawsuits in the Digital Age 

Five Takeaways on the Current and Future State of Cyber Claims

by Linda Comerford , Head of Claims, North America
Published

The ever-evolving landscape of technology is constantly pushing the boundaries of cyber insurance claims. While advancements in tech bring exciting possibilities, outdated legislation is struggling to keep pace. This creates a murky environment where data breaches can quickly morph into complex legal battles.

As the US Claims Operation Lead at Resilience, I’ve seen firsthand the complexities that come with managing modern cyber incidents. From ransomware to deep fake frauds, the threats are continuously evolving, demanding a proactive and informed approach to incident response and risk mitigation. Below are five key insights from my recent panel, “Back to the Future: A Roadmap for the Current & Future State of Cyber Claims,” at last week’s Complex Claims & Litigation Forum, offering a glimpse into the future of cyber claims management.

1. Lawsuits are a growing cost of ransomware and BEC.  

Cyber insurance claims arise from various situations, and understanding the triggers allows for better risk mitigation. Ransomware remains the top culprit, responsible for a staggering 81% of claims involving recovery expenses. However, the financial burden extends beyond data recovery. Legal action – including lawsuits, settlements, and class actions – is becoming increasingly commonplace following major breaches. In 2023, data breach class action filings reached record highs.

It’s not only ransomware incidents that are leading to lawsuits. Business email compromise (BEC) attacks are also leading to more litigation as their impact intensifies. Likewise, the liability in wire transfer losses is often complex, leaving victims with limited legal support. While cyber insurance can help offset the cost of a legal suit, it can rarely cover the entire cost.

Lawsuits are an unpredictable and significant cost of data privacy incidents, and they are likely to grow in prevalence as high-profile breaches receive more media attention. 

2.  New Tech, New Risks, New Lawsuits

The introduction of Artificial Intelligence (AI) has the cybersecurity community on high alert. AI-powered human-engineering attacks are becoming more sophisticated, tricking victims into divulging sensitive information that could spark litigation from both clients and other businesses.

Deepfakes and voice spoofing further complicate matters. These technologies lack a legal framework for detection and use, potentially leading to a surge in cyber breaches, claims, and data privacy lawsuits as AI’s influence grows. There is hope for new legislation in the future. In the meantime, AI is predicted to lead to an uptick in cyber breaches, claims, and data privacy lawsuits. 

The cyber-world is entering into the unknown regarding these new technological capabilities. However, the lack of modern legislation is not unique to AI. Most new technologies lack updated legislation to define the parameters of usage and data privacy, and old laws are being relied on to guide data privacy lawsuits. 

3. Outdated Laws vs. Cutting-Edge Tech: A Recipe for Disputes

The rapid pace of technological advancement dwarfs the glacial speed of legislative reform. This means most data privacy lawsuits rely on outdated laws that are ill-equipped to handle modern complexities. 

Consider the Video Privacy Protection Act (VPPA), which was established in 1988 for a pre-internet world that could never have imagined the introduction of social media. Now, courts interpret “video tape service providers” more broadly, encompassing companies offering recorded video content online. 

Take, for example, the class action lawsuit filed against Chick-fil-A, alleging they allowed a Facebook tracking pixel to monitor users’ video-watching behavior. The data sharing between the organization and Facebook breached the VPPA by sharing unique ID numbers that Facebook was able to use to identify users and send them targeted ads. 

Online tracking is a legal grey area, and several lawsuits have alleged VPPA violations over the past few years. Organizations must be mindful of what data they collect and how that data is used and more carefully consider what data they allow to be tracked when browsing online. 

4. Arbitration: A Streamlined Solution

As data privacy issues are increasingly brought into the courtroom, another less procedurally complex solution is growing in popularity. Arbitration offers an alternative dispute resolution that can be carried out in private, which means a simplified, less expensive, path to resolving conflicts. In an arbitration, lawyers for both sides present evidence to an independent party to make a well-informed and legally binding decision.  

Arbitration clauses are often included in large business contracts to establish a clear pathway for dispute resolution. For B2B and third-party businesses, an arbitration clause can be a preemptive strategy that keeps disputes out of a courtroom. Though arbitration is traditionally for businesses interacting with each other, individuals can contribute to mass arbitration regarding data privacy issues. 

Arbitration offers greater privacy than public lawsuits, which can minimize reputational damage and resolve disputes more quickly and confidentially.

5. Avoid Dispute: being mindful of how your organization uses and stores client data

While filing a claim is a great way to recover financially from an incident, avoiding one altogether is preferable. The best way to prevent a claim is to prevent an incident in the first place. Though cyber incidents are unpredictable, being mindful and following data privacy legislation is an easy step to help organizations avoid costly lawsuits. 

Resilience: Your Partner in Complex Claims

If you should experience an incident, navigating communications post-event requires experienced counsel to create a clear and succinct narrative. Oversharing can open the door to potential lawsuits if the public is made aware of details that were provided improperly. Likewise, expert guidance can help organizations mitigate reputational damage, resolve the incident more quickly, and offer guidance should the need for legal action or arbitration arise.

At Resilience, our expert claims team works hand-in-hand with our clients to keep claims from turning into complex litigation scenarios. When a complex situation is unavoidable, we offer access to a tailored network of forensics and legal experts who can help to navigate any challenges with old legislation, arbitrations, and more.

You might also like

third-party cyber risk management

New Frontier: Cyber Risk Mitigation with Superforecasting

You’re a CISO, bombarded from all sides. New vulnerabilities emerge daily, vendors tout countless security solutions, and your inbox overflows with security alerts. Your skilled analysts are stretched thin, struggling to keep pace with the ever-evolving threat landscape. How do you make sense of it all? How do you prioritize investments, allocate resources, and make […]

third-party cyber risk management

Cybersecurity Essentials: The Role of Vulnerability Management in Building Cyber Resilient IT Systems

Navigating the complexities of cybersecurity requires a strategic approach to mitigate risks and safeguard IT systems. Central to this approach is vulnerability management, a systematic process that identifies, assesses, and prioritizes vulnerabilities within organizations’ infrastructure. Understanding what vulnerability management entails and how it contributes to preemptive cyber defense is critical.  According to a recent report […]

third-party cyber risk management

Mastering Cybersecurity Risk Metrics: A New Way to Think About Cyber Risk

Digital threats are not just possibilities but inevitabilities; understanding and calculating cyber risk is more than a precaution – it’s a necessity. Understanding cybersecurity metrics is essential to safeguarding and improving business operations. Calculating cyber risks simplifies complex issues and empowers professionals to communicate them clearly to improve their organization’s digital security. This requires a […]

third-party cyber risk management

Evolving Cybersecurity: From Risk Management to Cyber Resilience

With an astonishing 95% of cybersecurity breaches attributed to human error, organizations must educate, train, and implement a security foundation for all employees. This staggering statistic highlights the vulnerability of humans within digital infrastructures and underscores the importance of building a security-forward mindset into the culture of resilient businesses.   As cyber threats continue to lead […]

third-party cyber risk management

Counting the Cost: Understanding the Financial Risk of Cybersecurity Breaches

Cybersecurity breaches stand as a relentless challenge for organizations worldwide, causing substantial financial repercussions. As cyber threats advance in complexity, the economic impact on businesses intensifies, affecting everything from upfront costs to sustained financial health.  A thorough investigation into the financial risks posed by cybersecurity breaches reveals the breadth of direct and indirect expenses that […]

third-party cyber risk management

Rewriting the Rules of Cyber Security Risks: Part II

Building Cyber Resilience requires a new approach to assessing, measuring, and managing risk. Traditional thinking from both the security and insurance sectors views risk management in binary silos that either stop an attack or fail to prevent loss. However, the truth is that cyber security risk is significantly more complex. Being resilient to cyber security […]