Latest Publications

Share:

Unlike Friendships, Policy Exclusions Are Not Severable In West Virginia

A homeowners insurance policy often covers every member of a family, and many policies state that the insurance applies separately to each insured. The same policies usually exclude coverage for intentional acts. But what...more

Cybersecurity Awareness Month: Visits From the Ghosts of Claims Past and Claims Future

Cybersecurity awareness month is nigh upon us again, and thus perspective is in order. 2016 brought us the first collection and analysis of the nascent claims history of the burgeoning cyber-insurance market. On August 27,...more

Court Compels Non-Signatory Affiliates, But Not Broker, To Arbitrate Premium Payment Dispute

National Union Fire Insurance Company of Pittsburgh brought a petition in a New York federal court, to compel nine related companies to arbitrate a payment dispute relating to certain policies of insurance issued to the...more

NAIC's New Cybersecurity Model Law Draft Is Still Flawed

Insurers are a prime target for hackers as a result of the vast stores of valuable data they maintain. Not all information is created equal, and it varies in value. Hacker services and software, illegal drugs, cyberweapons...more

New York Appellate Court Finds “Electronic Data” Exclusion Applies to Data Breach

The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more

Defining the Contours of Cyber Coverage for Data Breach: a Warning in Arizona

A year ago in this space, we looked at the receding wave of coverage litigation regarding whether various cyber-related exposures were covered under traditional policies, such as CGL and professional liability policies. ...more

Tenth Circuit Reverses UM/UIM Coverage Notification Class Certification

The named plaintiff in Soseeah v. Sentry Insurance had a Sentry auto policy. She declined UM/UIM coverage when she initially purchased her policy, and renewed annually thereafter. In 2010, the New Mexico Supreme Court held,...more

Grateful Marijuana Grower Scores Coverage Victory in Colorado Federal Court

The Green Earth Wellness Center operates a retail medical marijuana business and adjacent growing facility in Colorado Springs, Colorado. In 2012, it purchased commercial insurance from Atain Specialty Insurance Company....more

eCommerce Regulation, Bitcoin, Anti-Money Laundering, Shadow Insurance, 401(k) Litigation [Expect Focus – Vol. IV, Fall 2015]

IN THE SPOTLIGHT - - California Passes Life and Annuity Electronic Transactions Law LIFE INSURANCE - - Under a Spotlight, "Shadow Insurance" Lawsuit Fails Scrutiny - NAIC Evaluates Insurer’s Use of Variable...more

For Whom the Contractual Suit Limitation Period Tolls

Virginia’s Supreme Court recently addressed an issue of statutory interpretation that affects whether or under what circumstances a contractual suit limitation provision in an insurance policy may be tolled. In Allstate Prop....more

As TCPA Class Actions Soar, Issues Emerge in TCPA Coverage for Claims

Both the number of cases under the Telephone Consumer Protection Act (TCPA) and the types of practices that those cases challenge have mushroomed within the last several years. Yet a dedicated form of insurance against TCPA...more

McCarran-Ferguson Lands a Jab on the FAA

As we reported in this space late last year, the U.S. Supreme Court’s decision in AT&T Mobility LLC v. Concepcion, 131 S.Ct. 1740, 1745 (2011), tilted the scales toward federal power in the field of arbitration, preempting...more

Phishing for Cybersecurity Coverage: When is a Fraud a “Computer Fraud”?

In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more

Your Data Breach Collided With My Personal Injury Coverage

Editors at Wired magazine recently engaged in a year-long project to develop a means to hack the onboard computer of a Jeep, and override the driver’s control of several critical vehicle functions. According to a disturbing...more

Oregon Federal Court Finds Arbitration Agreement In CGL Policy Invalid

Plaintiff, Technical Security Integration, Inc., a Washington company, sold certain security and surveillance equipment and services. It hired Corey Tharp as a sales associate in Oregon, to tap his connections to that state’s...more

Cybersecurity Coverage Litigation: Learning to Survive After the Second Wave Hits

It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more

Telematics and Usage-Based Insurance

The NAIC’s Center for Insurance Policy and Research (CIPR) released a white paper analyzing the future of "telematics" in premium rate-making by auto insurers. Telematics allow for the measurement of actual driving...more

Telematics and Usage-Based Insurance: Benefits, Challenges, and the Future

The NAIC’s Center for Insurance Policy and Research (CIPR) released a white paper in March 2015 providing an excellent overview of the brave new world of automobile “telematics” data and their use in premium rate-making by...more

Cyber Risk as a Regulatory Issue: Tales of Encryption

Spurred by the prescient reporting found in this space (and, just maybe, by the Anthem data breach, which occurred a week later), insurance regulators have recently engaged in a flurry of regulatory activity relating to cyber...more

Cyber Risk as a Regulatory Issue: A Connecticut Regulator Shares Her Insights

Even at Sony, cyber security was a hot topic before Kim Jong-un took an interest in Seth Rogen’s oeuvre. In 2011, hackers gained access to the personal and financial information Sony had collected on more than 100 million...more

65 Results
/
View per page
Page: of 3

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
Feedback? Tell us what you think of the new jdsupra.com!