After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Under the Dome: Inside the Maine State House provides a high-level overview of recent activity at the Maine State House.
Gubernatorial Nominations Being Announced, Senate Confirmation Session Set -
Over the past...more
Insurance coverage for cyber risk – both first-party and third-party loss – is a burgeoning type of insurance many major carriers are now offering to their policyholders. In view of this significant growth, this blog will –...more
Much has been written about the New York Supreme Court’s landmark ruling in Zurich American Insurance Co. v. Sony Corp., Index. No. 651982/2011 (N.Y. Supr. Ct. Feb. 21, 2014), in which a New York trial court denied coverage...more
As NATO and the EU seeks to increase pressure on Russia and the Crimea, the EU expanded its sanctions against Russia on 12 September. This is the latest in a series of measures introduced since March in response to the...more
A federal court in Washington recently issued an unpublished decision affirming that a common policy exclusion protects insurers from having to provide coverage in certain cases of alleged privacy violations. The same court...more
Recent, large-scale data breaches at several well-known companies underscore the substantial risk that businesses now face with respect to cyber, data-security liability. In this year alone, numerous companies – including...more
In This Issue:
- NIST Announces October Workshop and Releases Framewok Update
- Insurance Company Succeeds in Cybersecurity Litigation
- Safe Harbor Under Attack — This Time From a US Group
Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more
Data protection rules will be adequately protected through the registry to be set up against frauds in the insurance sector according to the Italian data protection authority.
A recent article in August’s Best’s Review, The Rise of the Super Models, by Kate Smith (not Kate Upton, sorry), caught our eye. A lot is going on in the world of computer catastrophe modeling. First, demand by insurers and...more
• Electronic data and credit card information can be compromised due to malware, phishing, spear phishing, data loss and data theft
• The risk of cyber liability is real for ALL enterprises whether large or...more
As implied by the name, the commercial general liability (CGL) insurance policy provides businesses with coverage for a wide array of claims by third parties, including claims for damage to “tangible property” and claims...more
The prevalence of cyber data breach over the years has not only grown in number, but has also grown in size. Perhaps the most well-known example of a large-scale data breach is that suffered by Target Corp. occurring at the...more
The Recent Increase In Focus on Privacy Issues -
Privacy issues have been the focus of many state efforts over the past few years. However, the SEC has increased their focus tremendously over the past few months (see...more
On August 6, 2014, the New York Times – and other media outlets – reported that a Russian crime ring had amassed the largest known collection of stolen Internet data – a cache of at least 1.2 billion user name and password...more
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) ushered in broad national standards aimed at improving the efficiency and effectiveness of the U.S. health care system. Referred to generically as...more
In This Issue:
- Sovaldi Pricing Lower in Canada
- Implementation of the Affordable Care Act
- Other Federal Regulatory Initiatives
- Other Congressional and State Initiatives
- Other Health...more
The insurance industry continues to respond to the growing threat of data breaches by directing businesses facing that risk towards new, risk-specific cyber insurance products, while attempting to restrict coverage for data...more
On July 18, 2014, the County of Los Angeles (“the County”) filed a lawsuit in Los Angeles Superior Court again Michael D. Drobot, Sr., his son Michael R. Drobot, Jr. and their controlled entities, Pacific Hospital of Long...more
State and Federal Regulations Pertaining to Autonomous Vehicles -
While autonomous vehicles (AVs) are not yet a regular fixture on the nation’s roadways, policymakers, legislators and regulators have started to...more
In This Issue:
- DO SUBSIDIZED HEALTH CARE PLANS PURCHASED UNDER THE AFFORDABLE CARE ACT TRIGGER THE ANTI-KICKBACK STATUTE?
The advent of federally subsidized private pay health insurance under the Affordable...more
Your network is your company’s life blood. You want to be protected in the event your cybersecurity is breached; the attack on Target being a recent, well-publicized reminder to the threat of cyber attacks. ...more
No business is immune to data breach. Digital data in particular can be lost in innumerable ways, causing serious business interruptions and consumer injuries. After falling victim to a hack, virus, or cyber theft, companies...more
In This Issue:
- New Studies Highlight Privacy and Cybersecurity Risks and Costs
- SEC Commissioner Addresses the Role of the Board on Cybersecurity Matters
- Supreme Court Decision on Cellphone Searches...more
Encryption Flaw "Heartbleed" Creates Data Risk: How Insurance Can Stanch the Bleeding -
In early April, news broke of an encryption flaw named “Heartbleed” that exposed companies to data breaches for over two and one...more
Find a Science, Computers & Technology Author »
Back to Top