General Business Insurance Science, Computers & Technology

Read need-to-know updates, commentary, and analysis on General Business issues written by leading professionals.
News & Analysis as of

Phishing for Cybersecurity Coverage: When is a Fraud a “Computer Fraud”?

In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more

Catching Up To Insurers’ Use of Big Data

Various groups within the NAIC are beginning to study the way in which insurers are using big data. On the property and casualty front, the Market Regulation (D) (Market Reg) Committee is reviewing the use of big data in...more

Latest NAIC Cybersecurity News

The National Association of Insurance Commissioners has announced three initiatives in furtherance of its goal to address cybersecurity issues faced by insurance companies, their state regulators, and consumers, which it...more

State Data Breach Notification Requirements Specifically Applicable to Insurers

Almost all U.S. states and territories have enacted breach notification laws requiring private and/or government entities to notify individuals when their personal information is compromised....more

Fitbit Agrees to Sign Business Associate Agreements and Take on HIPAA Compliance

Is your Fitbit data covered by HIPAA? It depends upon where you got it (kind of). If you go to the store and pick up a Fitbit on your own, the data it generates is governed by the user agreement that you click through...more

Treasury Deputy Secretary Raskin Delivers Remarks On Cybersecurity and Insurance

On September 10, Deputy Secretary of the Treasury Sarah Bloom Raskin delivered remarks at the Center for Strategic and International Studies Strategic Technologies Program in Washington, D.C. After summarizing threats posed...more

Corporate Insurance Trends 2015

Over the last 12 months, the insurance industry has seen speculation with respect to litigation funding regulation, resolutions of large class actions and consolidation in the form of acquisitions in the industry. There has...more

Insurance News, Summer 2015

The U.S. Senate Commerce Committee asked Michael Menapace to testify as an expert witness at a hearing called by the Subcommittee on Consumer Protection, Product Safety, Insurance and Data Security entitled, "Examining the...more

A Guide for Insurers on Creating and Maintaining a Cybersecurity Plan

The intersection of valuable and personally identifiable digitized information and the increasing incidence of cybersecurity breaches makes the creation and maintenance of a cybersecurity plan one of the most pressing...more

The Top Six Things You Need to Know About the Internet of Things: A Legal Perspective

IoT is discussed in the media more and more frequently. It has important social, economic and legal implications, most of which are yet to be fully understood. The following sets out a brief list of things you should...more

Cyber-Attacks Against Government Contractors and the Availability of Insurance Coverage

Based on recent cyber-attacks against the United States Office of Personnel Management (OPM) and its subcontractors, USIS and KeyPoint Government Solutions, it is evident that government entities and government contractors...more

Five Tips for Success in Cyber Insurance Litigation

Many insurance coverage disputes can be, should be, and are settled without the need for litigation and its attendant costs and distractions. However, some disputes cannot be settled, and organizations are compelled to resort...more

Shocking? – Insurers Consider Potential Aggregate Risks from a Power Grid Attack

In the fast-developing cyber insurance marketplace, insurers have closely considered the possible risks and have analyzed the potential aggregation of such risks. While not the only topics of interest to insurers, these two...more

“Everything Old is New Again” – Issues in Recent Cyber Insurance Litigation

Early days still for coverage litigation about cyber risks – whether under cyber insurance policies or other types of policies. This is not surprising given the relatively short history of cyber risks and even shorter history...more

Orrick's Policyholder Insider Quarterly

Five Lessons Health Care Companies Should Learn From Cyberattacks - The American health care industry is under attack by sophisticated hackers seeking access to electronic medical records. Since January, three health...more

Cyberclaim Coverage Denied: The TCPA Protects Privacy, Not Personally Identifiable Information

In Doctors Direct Ins., Inc. v. Beaute’ E’mergente, LLC, No. 1-14-2919 (Ill. App. Ct. June 22, 2015), an Illinois state appellate court recently affirmed that a medical malpractice liability insurer did not owe a duty to...more

Cyber Liability Insurance – Does Your Retail Business Need It?

The news is full these days of hackers stealing credit card and other customer information from United States retailers such as Home Depot, Target, and Neiman Marcus (and the federal government) among others. These...more

Out of the Box: Federal Court in Utah Denies Duty to Defend under Cyber Policy

Cyber coverage may be the hottest topic in the insurance industry. More carriers are offering cyber coverage, and more consumers are coming to the market, trying to figure out what to buy with their premium dollars. And those...more

New Case Highlights Deep Hole in Cyber Insurance Policies

Insurance policies covering data breach liability began appearing roughly ten years ago. We noted then a troublesome provision in some forms that seemed to exclude coverage for the insured’s failure to maintain data security...more

Cybersecurity Coverage Litigation: Learning to Survive After the Second Wave Hits

It’s a familiar pattern. First, new risks inspire legislation and regulations that impose new penalties. Next, insurers and policyholders fight over whether the new liabilities are covered under traditional liability...more

Telematics and Usage-Based Insurance

The NAIC’s Center for Insurance Policy and Research (CIPR) released a white paper analyzing the future of "telematics" in premium rate-making by auto insurers. Telematics allow for the measurement of actual driving...more

Don’t Wait Until It’s Too Late: Top 10 Recommendations for Negotiating Your Cyber Insurance Policy

As more and more companies of all sizes ranging across a wide spectrum of industries have been exposed to network and data security breaches in recent years, the market for insurance products dedicated to cover cyber risks...more

The Devil in the “Cyber” Insurance Details

There’s a tempest amidst the recent spring shower of “cyber” insurance cases. It isn’t the Recall Total case reported the week before last, or the Travelers v. Federal Recovery Services case reported the week before. While...more

Protecting Directors and Officers From Derivative Liability Arising From Data Breaches

With data breaches affecting companies across virtually every industry, cyber security has remained front page news. Lawsuits brought by aggrieved consumers and financial institutions against companies that have suffered data...more

Insurers' Denials of Cybersecurity Claims Receive Judicial Support

Although cybersecurity-specific insurance has become more popular in recent years, some policyholders have attempted to obtain insurance for cybersecurity losses under their commercial general liability (CGL) policies. The...more

243 Results
View per page
Page: of 10

Follow General Business Updates on:

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.