News & Analysis as of

Data Security Policy Exclusions

Hinshaw & Culbertson - Insights for Insurers

Beyond Data Breach: Evaluating Coverage for Misuse of Information Claims

New and comprehensive privacy and cyber regulations continue to proliferate across the globe. These are not your father’s data breach notification laws. The scope of information included within these mandates has expanded...more

Farella Braun + Martel LLP

Time to Check Your Cyber Insurance

Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more

K&L Gates LLP

OnRisk: Insurance for Cyber Risk in M&A Transactions - A HUB Talks Podcast

K&L Gates LLP on

Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more

Steptoe & Johnson PLLC

First Look - Summer 2018: Insurance Newsletter

Steptoe & Johnson PLLC on

Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more

Alston & Bird

Class Action Roundup: Summer 2017

Alston & Bird on

Welcome to our second Roundup of 2017, where we feature the cases litigated and settlements finalized during the second calendar quarter of the year. It was a very active quarter in almost all of the categories we monitor,...more

Dentons

Hacked and Left Holding the Bag - Cyber Liability Issues

Dentons on

If you read any newspaper, trade publication or twitter feed, you know that ongoing concerns regarding cyber security continue to grow. We have seen an article in the New York Times discussing hacking of major law firms with...more

Dickinson Wright

Hello Insurers – Court says CGL may Cover Privacy Breaches Occurring Prior to 2014

Dickinson Wright on

In April 2013, Glens Falls Hospital admitted that the medical records for more than 2,300 of its patients were stored for several months on an unprotected computer server. The hospital’s outside records contractor, Portal...more

JAMS

Responding to a Security Breach: Insurance

JAMS on

It is an otherwise normal day until you, the General Counsel, receive a call from the CIO: “We have a cyber-security breach. We’ve identified some unusual activity and it appears that data has been sent out through unknown...more

Proskauer - The Capital Commitment

6 Questions PE Sponsors Must Ask About Their GPL Policies

Private equity fund sponsors are facing increased litigation risk from regulators and private parties, including limited partners and stakeholders in portfolio companies. As a result, private equity firms should re-examine...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide