Insurer says it's not liable for University of Utah's $3.3M data breach
In lawsuit, Colorado Casualty says its policies do not obligate coverage
Computerworld - An Englewood, Colo., insurance company has filed a federal lawsuit contending that it isn't responsible for reimbursing the University of Utah for $3.3 million in costs related to a 2008 data breach caused by a third-party service provider.
The lawsuit, filed in a Utah federal court by Colorado Casualty Insurance Co., contends that the insurer is not obligated to cover the costs now being sought by the university from the third-party service provider. Colorado Casualty was providing breach insurance to the third-party provider at the time of the breach.
The nine-page complaint, which seeks a declaratory judgment from the court, offers little explanation as to why exactly the insurer believes it is not obligated to pay the breach related costs sought by the university.
The breach occurred in June 2008, when burglars stole back-up tapes containing sensitive data on 1.7 million patients at the university's hospitals and clinics. The tapes were on their way to a storage facility when they were stolen from a car belonging to an employee at Perpetual Storage Inc. a Sandy-Utah-based data storage company used by the university.
The disks were recovered untouched a few days later, but the university ended up spending more than $3.3 million in breach notification costs, credit monitoring fees, phone bank costs and other expenses.
Steven McMurray, a lawyer representing Perpetual Storage, said that it's not unusual for insurance companies to dispute claims involving potentially large payouts.
"We have filed a motion to dismiss the compliant," he said.
The motion contends that that Colorado Casualty offered no obvious reasons for its objections, McMurray said. "We obviously think there is coverage," he added.
Since the breach, Perpetual has changed to another insurance provider, he said.
Christopher Nelson, a spokesman at University of Utah Health Care and Health Science, said the university would be "very disappointed" if a judge ruled in favor of Colorado Casualty's complaint. In that case, the university will consider other avenues, which could include filing a lawsuit against Perpetual or its insurance agent, to recover the money.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Data Security in Computerworld's Data Security Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- A More Predictable Way to Budget Software Costs Wavetronix enables creative collaboration while cost-effectively accessing all the latest tools with Adobe Creative Cloud for teams. For Wavetronix, collaboration was easy when...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface. All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!