Actions for Cyber Liability and Insurance : managing the risks of intangible assets
Cyber Liability and Insurance : managing the risks of intangible assets / T.R. Franklin, Ann G. Kale, Kelly Maheu, Donald K.S. Peterson, Joseph J. Schwerha, Marcia Sutton, John Stephen Wurzler
- Author
- Peterson, Donald
- Published
- Newburyport : The National Underwriter Company, 2012.
- Physical Description
- 1 online resource (239 pages)
- Additional Creators
- Kale, Ann G., Maheu, Kelly, Peterson, Donald K. S., Schwerha, Joseph J., Sutton, Marcia, and Wurzler, John Stephen
Access Online
- Contents
- Intro; About the Authors; Chapter 1: Understanding Intangible Assets; Intangible Assets and Goodwill; Assets that Are Intangible; Assets that Are Intellectual Property; Goodwill; Other Intangible Asset Classifications; Regulations and Organizations for Intangible Assets; Value and Value Identification for an Intangible Asset; Identifying and Categorizing Intangible Assets; A Companyâ#x80;#x99;s Internal Audit and Search for Intangibles; Identifying an Intangible Asset; Other Helpful Organizations; Dynamic Intangible Assets; Grouping Intangible Assets into Bundles; Marketing Bundle., Computer-Related Bundle of Assets (the Software Bundle)Technology Bundle of Assets; Other Types of Intangible Assets; Bundling Intangible Assets after â#x80;F̈iling for Bankruptcy Protection; Inventory and Control of the Assets; Chapter 2: Valuation of Intangible Assets; Traditional Valuation Techniques for Intangible Assets; The Cost Approach to Valuing Intangible Assets; The Market Approach to Valuing Intangible Assets; The Income Approach to Valuing Intangible Assets; The Relief from Royalty Approachâ#x80;ẗo Valuing Intangible Assets; The Technology Factor Approach â#x80;ẗo Valuing Intangible Assets., Alternative Ways to Value Intangible AssetsThe Context in Which You Value Intangible Assets; Research and Financial Considerations; Intangible Assets Remaining Life; The Discount Rate; The Valuation Process: A Summary; Tests that Confirm Intangible Assets Have Value; The Triage Process: Prioritizingâ#x80;ẗhe Assets that You Are Valuing; Valuing Groups of Intangible Assets; Royalty Rates; Online Assets; Valuing Technology; Summary; Chapter 3: Identification of Risks Associated with Intangible Asset Management; Cybercrime; Legal and Regulatory Risk; Lack of Information Security and Privacy., Rogue EmployeesMaintenance of Electronically Stored Information; Chapter 4: Third-Party Coverage; Types of Insurance; Claims-Made v. Occurrence Coverage; Personal and Advertising Injury in Commercial General Liability Policies; CGL Marketplace; Errors & Omissions Policies for Media, Tech and Internet; Other Policies and Coverages; Key/Typical Exclusions; Uninsurable Risks; Insurance Claims; Market Trends; Chapter 5: Technology and the Role of the Insurance Agent or Broker; Legal Difference between Agent and Broker; Understanding the Customerâ#x80;#x99;s Needs; Risk Management Options., and Submitting Applications to UnderwritersNegotiating Coverage; Evaluating Coverage; Keeping Abreast of Developments; Chapter 6: What Every Business Needs to Know to Survive a Cyber Security Event; Categorization of Information and Information Systems; Security Objectives; Potential Impact on Organizations and Individuals; Security Categorization Applied to Information Types; Security Categorization Applied to Information Systems; Five Common Myths Regarding Network Security; Claim Scenarios; The Most Important Thing to Remember When Confidential Information is Exposed or Compromised.
- Subject(s)
- ISBN
- 1938130251
9781938130250 (electronic bk.) - Note
- Preparing an Effective Communications Strategy for Use in Response to Cyber Security Events.
View MARC record | catkey: 43200528