Feeds

Sony insurer says it's not liable for costs of data breach

Sues game maker for saying otherwise

Providing a secure and efficient Helpdesk

Sony has been sued by its insurance company, which says the policy it issued doesn't cover a series of high-profile security breaches that exposed personal information associated with more than 100 million accounts.

A complaint filed Wednesday by the Zurich American Insurance Company (ZAIC) and the Zurich Insurance Company said the breaches have generated at least 55 class-action complaints against Sony in the US and three in Canada. Additionally Sony has been subject of investigations conducted by one or more state attorney general's offices, the US Federal Trade Commission, and the House Subcommittee on Commerce, Manufacturing, and Trade relating to the unauthorized access of its customers' data.

Sony has said more than 100 million accounts were affected and estimated the cost at $171 million.

The biggest of the breaches stemmed from an April hack attack on its PlayStation Network, which exposed names, addresses, email addresses, passwords, and other sensitive data for 77 million accounts. An attack on Sony Online Entertainment, the company's computer games service, breached the security of another 25 million accounts. Two months later, hackers gained unauthorized access to 50,000 more accounts created on the Sony Pictures website.

According to the complaint, Sony tendered the complaints and claims to Zurich and has demanded that the insurer defend it against the claims. It goes on to say ZAIC isn't obligated to cover the costs because Sony's insurance policy insures only against legal claims for "bodily injury", "property damage", and "personal and advertising injury".

"ZAIC therefore has no obligation to defend or indemnify the Sony defendants under the ZAIC Excess Policy for the claims asserted in the class action complaints or the miscellaneous claims," the complaint, filed in the Supreme Court of New York County, stated. It seeks a court ruling that none of the hack attacks qualify for coverage.

A PDF of the document is here. ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.