It is the practice of the Women’s Energy Network (WEN) to protect against the unauthorized access, use, corruption, disclosure, and distribution of sensitive information in its possession, and to comply with all applicable state and federal laws and regulations regarding such information. The Women’s Energy Network shall hold sensitive information in strict confidence and shall not release or disclose such information to any person except as required or authorized by law and only to such people who are authorized to receive it. WEN shall not utilize any sensitive information for any purpose other than the administration of a receivership or in the event that it assists a regulator in the supervision of an insurer.  

Information Systems

The Women’s Energy Network shall adopt procedures for protecting and maintaining the security and integrity of its information systems including network infrastructure and software design, information processing, storage, transmission, retrieval and disposal. These procedures shall address the following matters: 

  1. Limiting access to those individuals necessary to carry out WEN’s role with respect to sensitive information.
  2. Protecting physical and electronic records from unauthorized access, interception, distribution, or destruction.
  3. Records back-up and off-site storage procedures to prevent inadvertent loss or destruction of records.
  4. Data security procedures to prevent unauthorized access or interception of sensitive information.
  5. Procedures for protecting data when changing, upgrading, or replacing servers, computers, or other storage media.
  6. Procedures for properly disposing of unneeded or outdated records.
  7. Procedures to monitor, detect, and report upon any improper disclosure or theft of sensitive information.

Information Security and Response 

In the event sensitive information is accessed by someone without proper authorization, the Women’s Energy Network shall immediately investigate and take appropriate remedial actions to mitigate or prevent loss or damage to affected individuals. Each situation will be evaluated separately, and based upon the potential for loss or damage to affected individuals; WEN will take one or more of the following measures:

  • Make such notifications to affected individuals as may be required by law.
  • Report the incident to appropriate law enforcement officials.
  • Determine the nature and cause of the security breach and implement corrective measures.