Latest Publications

Share:

Is a receiver’s property manager protected by the Barton Doctrine and quasi-judicial immunity

Q: I was appointed receiver over a manufacturing facility. I operated it for a short time and then obtained court authority to sell it. I netted $1.4 million from the sale....more

A New Twist on Coverage for Losses From ‘Spoofed’ Emails

The facts are frequently the same. A company that has retained the services of a vendor receives an authentic-looking email from the vendor’s CFO which advises that the vendor has changed its bank account or method of...more

Courts surprisingly affirm insurance coverage to defend against economic loss

For parties facing class action lawsuits, where the class seeks to recover for economic losses, there may still be opportunities for insurance coverage. Thus, where economic losses arise out of the purchase of products that...more

Opportunities for insisting on independent counsel

Civil Code section 2860 authorizes the retention of independent counsel in the event a conflict of interest arises between the insurer and its insured. Under the statute a conflict of interest is deemed to arise “when an...more

Traps for the Unwary: Reporting Requirements Under Liability Policies

Companies reporting liability insurance claims need to be aware that the pertinent rules vary depending on whether a policy is “claims made and reported” or “occurrence”. Most, if not all, Directors and Officers and Errors...more

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Insurance Coverage for Email Scams

A genuine looking email is sent to a company’s accounts payable department with instructions from its president to pay money to a certain account. The “To” and “From” headers and the signature block look identical to hundreds...more

Companies That Pay Hackers May Be Able to Recoup Their Losses

Where companies are victimized by ransomware or email scams, their losses arise from payments made by an officer or employee of the company. In the case of ransomware, a company’s files are held hostage pending payment...more

Email Scam Losses May Find Recourse Via Cyber Or Business Interruption Coverage

Losses arising from email scams are usually covered, if at all, under a company’s crime policy. But a recent decision from The District Court in Minnesota suggests that recourse may also be found under an insured’s cyber or...more

Getting Your Insurer To Favorably Resolve Litigation

Where a liability carrier has assumed its insured’s defense under a reservation of rights, a variety of conflicts between those parties may arise when there are settlement discussions to resolve the underlying litigation....more

Are Consumer Protection or False Advertising Claims Covered By Insurance?

​​​​​​​Whether consumer protec­tion or false advertising claims are covered by insurance depends on the kind of insurance policies in play. For ex­ample, coverage for such claims under a CGL policy is unlikely be­cause an...more

FTC Issues Policy Statement on Gig Work

​​​​​​​On September 15, 2022, the Federal Trade Commission (“FTC”) issued a Policy Statement on Enforcement Related to Gig Work (the “Policy Statement”). The agency’s press release states: “American workers deserve fair,...more

Insurance Coverage For Claims Involving The Misuse Of Biometric Information

​​​​​​​As the use of biometric information for verification purposes becomes widespread, employers and others should be aware of statutes which regulate the collection, storage and dissemination of this data. In this regard,...more

Third-Party Email Fraud Covered By Insurance Policies

In Medidata Solutions, Inc. v. Federal Insurance Company, 268 F. Supp. 3d 471 (S. D. N. Y. 2017), aff’d, 729 Fed. Appx. 117 (2nd Circuit 2018), the Court found that there was insurance coverage where a company had been...more

Multiple Liability Policies and Who Pays First

Where multiple liability policies are triggered, does one of the insurers get to insist that its deductible be satisfied before the insured can be provided with a defense? Relatedly, can the insured choose which insurer...more

Mind the Proper Use of ‘Prior Knowledge’ Exclusions

Liability insurance written on a claims made basis is designed to protect an insured against claims asserted following the policy’s inception even if the acts giving rise to the claim took place prior to policy inception. But...more

Does your Insurance Policy Protect you from Email Spoofing?

Your CFO or accounts payable clerk receives a legitimate-looking email supposedly from the company’s president authorizing a wire transfer to a vendor or business partner. In reliance on that email, the company’s bank is...more

9th Circuit says Computer-Fraud Policies May Cover ‘Spoofing’

Consider the following two scenarios resulting in identical losses, but potentially two entirely different insurance coverage outcomes. In the first instance, a thief hacks, or gains unauthorized entry, into an insured’s...more

Personal Jurisdiction in the Digital Age

The concept of “presence” for jurisdictional purposes has evolved with the widespread use of websites, social media and other digital platforms. A company or individual may have no physical presence in a forum, but may...more

Ruling is Instructive of Biometric-Related Claims and Insurance

As part of the larger trend of invasion of privacy claims asserted by employees or consumers against businesses, several states have recently passed legislation that sets forth requirements for the collection, storing and...more

Construction Defect Damages May Exceed Cost To Repair

Construction defect cases often involve damage claims beyond simply the cost to repair the allegedly defective unit or component. These consequential damages may include damages for loss of use, expenses for mitigation and...more

Mitigating a Company’s Liability When a Data Breach Is Suffered by a Vendor or Service Provider

Data breaches by large companies have been in the news for some time. Over the last several years several companies, including Marriott, Yahoo and Volkswagon, have been victimized by hackers who have broken into a company’s...more

Ruling Breaks New Ground For CGL Policy Data Breach Coverage Hackings

A recent case from the 5th U.S. Circuit Court of Appeals breaks new ground on the question of whether a commercial general liability policy provides coverage for damages arising from a data breach caused by a third-party...more

Bad Faith Liability Can Arise Even Absent A Demand Within Policy Limits

In some circumstances an insurer’s duty to settle may arise even in the absence of a demand by the claimant within policy. The recent case of Planet Bingo, LLC v. The Burlington Insurance Company, 2021 DJDAR 2510 (March 18,...more

'Notice-Prejudice Rule' Ruling Could Provide New Arguments

The “notice-prejudice rule,” often applied in the context of occurrence-type policies, requires an insurer to prove that the insured’s late notice of a claim has substantially prejudiced its ability to investigate the...more

39 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide