Cyberinsurance Policy Cyberinsurance Policy
Information Policy

Cyberinsurance Policy

Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks

    • $49.99
    • $49.99

Publisher Description

Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management.

As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. 
 
Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood.
 

GENRE
Business & Personal Finance
RELEASED
2022
30 August
LANGUAGE
EN
English
LENGTH
296
Pages
PUBLISHER
MIT Press
SELLER
Random House, LLC
SIZE
1.1
MB

More Books Like This

Cloud Computing and Electronic Discovery Cloud Computing and Electronic Discovery
2014
Cybersecurity Law Cybersecurity Law
2022
Combating Piracy Combating Piracy
2017
The Closing of the Net The Closing of the Net
2016
Information Technology and Traditional Legal Concepts Information Technology and Traditional Legal Concepts
2013
Burdens of Proof Burdens of Proof
2012

More Books by Josephine Wolff

Other Books in This Series

The Blockchain and the New Architecture of Trust The Blockchain and the New Architecture of Trust
2018
The Character of Consent The Character of Consent
2024
Universal Access and Its Asymmetries Universal Access and Its Asymmetries
2022
The Power of Partnership in Open Government The Power of Partnership in Open Government
2022
Resistance to the Current Resistance to the Current
2022
Farm Fresh Broadband Farm Fresh Broadband
2021