BEGIN:VCALENDAR VERSION:2.0 PRODID:-//ChamberMaster//Event Calendar 2.0//EN METHOD:PUBLISH X-PUBLISHED-TTL:P1H REFRESH-INTERVAL:P1H CALSCALE:GREGORIAN BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU DTSTART:20070101T000000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:Eastern Daylight Time END:DAYLIGHT BEGIN:STANDARD RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU DTSTART:20070101T000000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:Eastern Standard Time END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;VALUE=DATE:20211110 DTEND;VALUE=DATE:20211111 TRANSP:TRANSPARENT X-MICROSOFT-CDO-ALLDAYEVENT:TRUE SUMMARY:MLIS - Cyber & Privacy Liability Exposures - Live Webinar Presented by Kym Martell DESCRIPTION:9:00 AM - 4:00 PM\n\nNEW! The Management Liability Insurance Specialist (MLIS) designation program provides specialized expertise in the fundamentals of professional liability insurance and the more specific nuances of directors and officers (D&O) liability\, employment practices liability (EPL)\, and fiduciary liability exposures and insurance. Plus\, this program is completely updated with an all new cyber course and the latest laws\, ruling changes\, coverages\, exposures\, and the information you need to succeed.Those who complete the program are entitled to display the MLIS certification to demonstrate their knowledge of management liability insurance and risk management. Recommended for retail insurance agents/brokers and risk managers\, as well as surplus lines brokers and underwritersThis course has two major goals. The first is to provide an overview of the kinds of situations that can give rise to both property and liability losses when a business engages in cyber and electronic activities. More specifically\, companies that use e-mail\, operate a website\, take orders online (and collect customer data in the process)\, participate in social media activities\, or engage the services of a cloud provider are exposed to significant potential first-party property and third-party liability claims.The second objective is to offer a detailed look at the kinds of policy forms that have been designed to cover these exposures. Thus\, the second half of the course begins by analyzing the policies' insuring agreements and continues by discussing other key provisions\, such as insured persons\, insured organizations\, defense/settlement\, coverage limits\, and retentions. The course concludes by examining the most common exclusions found within cyber and privacy policy forms\, focusing on the manner in which such wordings vary from insurer-to-insurer\, and explaining how these variations exert significant impact on the scope of coverage that cyber and privacy policies provide.\n\nLearning Objectives\nThis is an intermediate level course. Upon completion\, students will be able to:recognize key areas of confusion inherent in cyber and privacy coverage\, beginning with the fact that it is referred to under different names by different insurersidentify the major types of third-party liability losses that result from cyber and electronic activities: (1) information security liability\, (2) privacy liability\, and (3) content liability\nrecognize the major types of first-party property losses that result from cyber and online activities: (1) business interruption\, (2) dependent business interruption\, (3) extra expense\, (4) data asset loss\, (5) cyber extortion\, (6) computer fraud\, (7) funds transfer fraud\, and (8) miscellaneous crime lossesrecognize how social media and cloud computing create many of the property and liability exposures noted above\nidentify various loss control measures that can be applied to eliminate\, or at least reduce\, the extent to which a business can be financially impacted by these loss exposuresrecognize how cyber and privacy insurance is rated by insurers and identify the key factors that underwriters consider in pricing the coverage\nrecognize the effect of the key first-party property and third-party liability insuring agreements found within the policiesrecognize how the following types of provisions operate within a cyber and privacy policy: (1) insured persons/organizations\, (2) defense/settlement\, (3) limits\, and (4) retentions\nidentify the most important exclusions found within cyber and privacy forms\, recognize how different insurers' versions of these same exclusions vary\, and recognize how such differences impact the scope of coverage the policies provideApproved for 6 NJ CE Credits X-ALT-DESC;FMTTYPE=text/html:
9:00 AM - 4:00 PM
NEW! The Management Liability Insurance Specialist (MLIS) designation program provides specialized expertise in the fundamentals of professional liability insurance and the more specific nuances of directors and officers (D&\;O) liability\, employment practices liability (EPL)\, and fiduciary liability exposures and insurance. Plus\, this program is completely updated with an all new cyber course and the latest laws\, ruling changes\, coverages\, exposures\, and the information you need to succeed.
Those who complete the program are entitled to display the MLIS certification to demonstrate their knowledge of management liability insurance and risk management.  \;Recommended for retail insurance agents/brokers and \;risk managers\, as well as \;surplus lines brokers and underwriters
This course has two major goals. The first is to provide an overview of the kinds of situations that can give rise to both property and liability losses when a business engages in cyber and electronic activities. More specifically\, companies that use e-mail\, operate a website\, take orders online (and collect customer data in the process)\, participate in social media activities\, or engage the services of a cloud provider are exposed to significant potential first-party property and third-party liability claims.
The second objective is to offer a detailed look at the kinds of policy forms that have been designed to cover these exposures. Thus\, the second half of the course begins by analyzing the policies&rsquo\; insuring agreements and continues by discussing other key provisions\, such as insured persons\, insured organizations\, defense/settlement\, coverage limits\, and retentions. \;The course concludes by examining the most common exclusions found within cyber and privacy policy forms\, focusing on the manner in which such wordings vary from insurer-to-insurer\, and explaining how these variations exert significant impact on the scope of coverage that cyber and privacy policies provide.
Learning Objectives
This is an intermediate level course. Upon completion\, students  \;will be able to:
Approved for 6 NJ CE Credits
LOCATION:NJ UID:e.1494.303499 SEQUENCE:3 DTSTAMP:20240328T091959Z URL:https://members.biginj.org/education-events/Details/mlis-cyber-privacy-liability-exposures-live-webinar-presented-by-kym-martell-283970?sourceTypeId=Hub END:VEVENT END:VCALENDAR