Latest Publications

Share:

The War Exclusion and State-Sponsored Cyberattacks: The Battle Is Won but Is the War Over?

Sovereign nation states have been behind (or suspected of being behind) some of the worst cyberattacks. When a cyberattack has state involvement, the inevitable question is whether it constitutes an act of war. The answer can...more

Is There a Glitch in Insurance Coverage for Social Engineering Scams?

Social engineering scams seeking to deceive companies into making wire transfers to fraudulent bank accounts continue to plague companies. According to the FBI, social engineering fraud costs businesses billions of dollars...more

Credit Insurance: Insurance for Late Payments or Nonpayments

Recent events and the decline of the global economy have brought a raft of notices of late payments or no payments for creditors, lenders, landlords, and trade counterparties. In many instances there may be no notice at all,...more

The Key Issue in Revived Sex Abuse Claim Insurance Disputes

In January of this year, New York passed the Child Victims Act. Previously, the state required that childhood sexual abuse suits be filed before a plaintiff’s 23rd birthday. The CVA includes a one-year period, known as a...more

Lawsuit Underscores Need to Review Cyberinsurance Policies

The WannaCry and NotPetya computer viruses that infected computer systems around the world in 2017 sounded a wake-up call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies and...more

Recent Lawsuit Highlights Need for Careful Review of Cyberinsurance Policies

The “WannaCry” and “NotPetya” computer viruses that infected computer systems around the world in 2017 sounded a wakeup call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies...more

Seeking Insurance Coverage for Data Breach Claims? A Recent Case Confirms that Certain D&O Policies Potentially Provide Coverage

Businesses are increasingly purchasing dedicated cyber insurance policies to address their cyber and data security exposures. To date, however, many of the judicial decisions addressing insurance for cyber exposures have done...more

Five Risk Management Tips to Prepare for the Road Ahead

We are nine months into a new administration marked by continued uncertainty regarding the legal, regulatory, and budgetary environments for government contractors. Although contractors have benefitted from a precipitous drop...more

Managing Cyber Risks: Tips for Purchasing Insurance That Works for Your Business – Part II

This article highlights several strategies for maximizing the value of a cyber insurance purchase. The first part of the article, which appeared in the May 2017 issue of Pratt’s Privacy & Cybersecurity Law Report, highlighted...more

Cybersecurity, Cyber Insurance: What Fund Directors Need to Know

Cyberattacks are attempts by hackers to damage, destroy and/or steal data from a computer network or system. From 2013 to 2015, more than 153.6 million people had information stolen in cyberattacks involving companies such as...more

Augmented Reality Insurance Risks: Gotta Catch ‘Em All

The rising Pokemon Go sensation has dramatically increased the popularity of augmented reality games, but it has also brought with it increased risks and liabilities for both game users and developers alike. For those who...more

11 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide