AGG Talks: Healthcare Insights Podcast - Episode 4: What to Do When Insurance Companies Deny Behavioral Health Claims
Best Practices for Negotiating Manuscript Exclusions
Coverage Issues Arising Out of Assault and Battery Claims
Long-Term Effects of Russia/Ukraine on Insurance
Mediating Complex Insurance Coverage Disputes Series Part 3 – Breaking the Log Jam
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Mediating Complex Insurance Coverage Disputes Series Part 2 – What Goes on in Mediation?
Mediating Complex Insurance Coverage Disputes Series Part 1 – Preparing For The Mediation
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Settling a Claim: Get Comfortable With Being Uncomfortable
NGE OnDemand: The Importance of Timely Reporting Occurrences, Claims and Suits to Insurers with Paul Walker-Bright
Lowenstein’s New Insurance Recovery Podcast Series, “Don’t Take No for an Answer”
Ledgers and Law: Roadblocks Facing the Cannabis Industry
Subro Sense - The ABC's of RCV and ACV
WEBINAR: COVID-19 Insurance Coverage Class Actions
What to Do When Your Insurance Carrier Says No: How to Protect Yourself from Coverage Denials
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
In Part I of this series, we posed a series of questions to consider when purchasing cyber insurance. Our approach was deliberate: the right questions help get you the right insurance to address cyber risks facing your...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
As an update to our March 8, 2022 blog post discussing coverage for phishing scams in the context of Ernst & Haas Mgt. Co. v. Hiscox, Inc., 23 F.4th 1195 (9th Cir. 2022), a new Alaska case relied on Ernst & Haas to find...more
The “war” exclusion has gotten more attention over the past couple of weeks in light of Russia’s invasion of Ukraine. For good reason. This exclusion, common in property and liability policies alike, typically eliminates...more
Jerich Beason & Whitney McCollum speak on this Cyberside Chat to discuss the recent Merck & Co. cyber insurance win and how this impacts future wars fought with cyber weapons such as the conflict in Ukraine. This case sets a...more
Ransomware attacks were already on the rise prior to the COVID-19 pandemic, but the prevalence of such cyberattacks substantially increased during the pandemic due, in part, to additional security risks associated with the...more
Social engineering scams seeking to deceive companies into making wire transfers to fraudulent bank accounts continue to plague companies. According to the FBI, social engineering fraud costs businesses billions of dollars...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
Cyberattacks are an increasingly frequent and costly risk faced by almost every business today. While the availability and scope of cyber-specific insurance has developed exponentially over the past few years, it is important...more
Companies of all sizes have fallen victim to attacks whereby fraudsters will use deceptive communications, such as spoofed emails, to trick an employee into transferring money into the fraudsters’ control. While these...more
With the expansion of privacy legislation—from the General Data Protection Regulation (GDPR) in Europe to the coming California Consumer Privacy Act (CCPA) in the United States—cyber liability insurance is taking on increased...more
Today, it seems hardly a month passes without a report of another business falling victim to a data breach. Over the past few years, some of the largest and well-known companies such as Equifax, Target, Home Depot, TJ Maxx,...more
In this month's Privacy & Cybersecurity Update, we examine several recent U.K.-related cybersecurity developments and the SEC's risk alert reminding investment advisers and broker-dealers to follow through on implementing...more
In this month's edition, we examine cybersecurity-related state Supreme Court rulings in Pennsylvania, Vermont and Illinois; the Department of Health and Human Services' cybersecurity guidelines for the health care industry;...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
Issues of digital privacy are multi-faceted and extend far beyond the now-routine data breaches that make headlines. The digital collection, use, and storage of biometric information (fingerprints, retinal or iris scans,...more
Remember the “good” ol’ days when the run-of-the-mill theft involved someone physically taking something tangible? That is so 20th century. Now, thieves and fraudsters are able to use computers and the internet to carry out...more
The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more
In this edition of our Privacy and Cybersecurity Update, we take a look at the Trump administration's executive order outlining its cybersecurity plans, Acting FTC Chairwoman Maureen Ohlhausen's comments on the possible...more