Science, Computers & Technology Privacy Insurance

Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
News & Analysis as of

U.S. Court for District of Minnesota Dismisses Target Data Breach Shareholder Derivative Suits

On July 7, 2016, the United States District Court for the District of Minnesota granted Target’s unopposed motion to dismiss the derivative actions filed by a number of shareholders against the company relating to the...more

Black Hat Reports Increase in Cybersecurity Concerns

The 2016 Black Hat Attendee Survey was published in advance of the 2016 Black Hat Conference. Not surprisingly, the respondents to the survey conveyed an increased concern regarding security breaches versus 2015. An alarming...more

New, Relaxed Regulations Make Drone Use on Construction Projects Easier

The Federal Aviation Administration (FAA) recently introduced relaxed regulations concerning the use of drones for commercial purposes. The new regulations could have a significant impact on drone usage in the construction...more

New York Appellate Court Finds “Electronic Data” Exclusion Applies to Data Breach

The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more

Drone Mapping the Way of the Future for Insurance Companies

Drone mapping provides insurance companies with an easy, fast and accurate method of documenting a scene and preserving key details while also letting the process of clean-up and reconstruction begin as quickly as possible....more

Privacy & Cybersecurity Newsletter: July 2016

General Data Protection Regulation Update - As reported in the April Locke Lord Privacy & Cybersecurity Newsletter, the European Parliament gave the final approval to the General Data Protection Regulation (GDPR) on...more

Fourth Circuit Affirms CGL Coverage of Cyber Incident

In a recent, unpublished opinion, the Fourth Circuit held that an insurer had a duty to defend its insured under a CGL policy for a cyber incident. A class action complaint was filed against Portal Healthcare Solutions...more

Cyber Attacks Reach Subrogation

It was just a matter of time. As cyber-attacks rose and the data security breaches became increasingly devastating to businesses and individuals, cyber breach insurance became more prevalent. And where insurance appears,...more

Another One Bites the Dust: Maryland Federal District Court Dismisses Putative Data Breach Class Action for Lack of Standing

The United States District Court of Maryland recently dismissed a putative class action alleging that CareFirst’s failure to adequately secure the computer hardware storing their customers’ personal information led to two...more

Revisiting Cyber Insurance: Are You Covered?

Increasingly, companies are looking to insurance to help manage their cybersecurity risks and defray losses sustained from data breaches. Losses can range from reputational damage, business interruption, and professional...more

Defining the Contours of Cyber Coverage for Data Breach: a Warning in Arizona

A year ago in this space, we looked at the receding wave of coverage litigation regarding whether various cyber-related exposures were covered under traditional policies, such as CGL and professional liability policies. ...more

First home cyber protection insurance offered by Hartford Steam Boiler

The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more

Does Your Company Have Coverage for PCI Fines & Penalties in its Cyber Policy?

Payment Card Industry fines and penalties are fines charged by payment card brands like Mastercard and Visa to merchants’ acquiring banks for violation of their industry rules and regulations, which often occurs when there is...more

NAIC Cybersecurity Task Force Weighs Credit Freezes

On May 24-25, the NAIC Cybersecurity (EX) Task Force held an interim meeting to hear comments from various industry trade organizations and other interested parties on the proposed Insurance Data Security Model Law exposed...more

Data Breaches Response Costs Continue to Rise

SEC Chair Mary Jo White recently opined that cyber security is the biggest risk facing the United States financial system. Companies should take heed of that warning in light of the release of the 2016 Cost of Data Breach...more

Update: Illinois Adopts Amendment to Simplify Insurer Record Retention and Destruction Requirements

The Illinois Department of Insurance (“IL DOI”) has amended its record disposal and destruction regulation effective May 23, 2016, significantly reducing reporting, book-keeping and retention obligations for Illinois domestic...more

Data Security Safeguards Can Help Healthcare Employers Withstand Cyberattacks—and Government Audits

The last couple of years have brought a steady rain of bad news for the healthcare industry when it comes to data security: Insurers faced with massive data breaches affecting thousands of health plans and millions of...more

First company in the world to create drone navigation system integrated with insurance

Recently, Singapore-based ALAS Pte Ltd (ALAS) demonstrated its new software system for drone navigation, integrated with insurance for all users, at the Asia Pacific Remotely Piloted Aircraft Systems (RPAS) Symposium held in...more

Chinese Leftovers: P.F. Chang’s Not Entitled to $2 Million in Breach Costs

In what is thought to be the first published decision in a cyber insurance coverage case, popular Chinese restaurant chain, P.F. Chang’s, was denied coverage for certain costs incurred as a result of a 2014 data breach....more

How to Respond to a Cyber Extortion Demand

Cyber extortion refers to a situation in which a third party threatens that if an organization does not pay money, or take a certain action, the third party will take an adverse action against the organization. Among other...more

Insurer Held to Have Duty to Defend Allegations that Patients’ Medical Records Were Accessible Via Google Search

The Fourth Circuit Court of Appeals recently held that an insurer had a duty to defend an insured against class action allegations that the insured posted confidential medical records on the Internet. Two patients at Glen...more

2016: The Year of Cyber Insurance?

It has been said that there are two types of companies in the world – those that have been hacked, and those that do not yet know they have been hacked. While perhaps an overstatement, it seems that every day, another company...more

Arizona Court Rules That Chubb Cyber Policy Does Not Cover Credit Card Theft Losses

As cyber attacks increase at an unprecedented pace, more and more businesses are purchasing cyber insurance to protect against that risk. The insurance industry now faces an avalanche of claims, and those claims now are...more

Mobile Device Privacy Considerations for Employers

The use of mobile devices in the workplace, including cell phones, tablets, and other devices, has generated significant risks for employers, both in terms of data security and of litigation strategy. Access to these devices...more

415 Results
|
View per page
Page: of 17

Follow Science, Computers & Technology Updates on:

JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×