AGG Talks: Healthcare Insights Podcast - Episode 4: What to Do When Insurance Companies Deny Behavioral Health Claims
Best Practices for Negotiating Manuscript Exclusions
Coverage Issues Arising Out of Assault and Battery Claims
Long-Term Effects of Russia/Ukraine on Insurance
Mediating Complex Insurance Coverage Disputes Series Part 3 – Breaking the Log Jam
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Mediating Complex Insurance Coverage Disputes Series Part 2 – What Goes on in Mediation?
Mediating Complex Insurance Coverage Disputes Series Part 1 – Preparing For The Mediation
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Settling a Claim: Get Comfortable With Being Uncomfortable
NGE OnDemand: The Importance of Timely Reporting Occurrences, Claims and Suits to Insurers with Paul Walker-Bright
Lowenstein’s New Insurance Recovery Podcast Series, “Don’t Take No for an Answer”
Ledgers and Law: Roadblocks Facing the Cannabis Industry
Subro Sense - The ABC's of RCV and ACV
WEBINAR: COVID-19 Insurance Coverage Class Actions
What to Do When Your Insurance Carrier Says No: How to Protect Yourself from Coverage Denials
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
In Part I of this series, we posed a series of questions to consider when purchasing cyber insurance. Our approach was deliberate: the right questions help get you the right insurance to address cyber risks facing your...more
In a unanimous decision, the Ohio Supreme Court found that appellee EMOI Services, LLC’s (“EMOI”) businessowners insurance policy does not cover losses resulting from a ransomware attack on EMOI’s computer software systems....more
In the last week of December 2022, the Ohio Supreme Court published a much-anticipated decision in the EMOI Services LLC v. Owners Insurance Co. case. The decision was bold, and the court made no attempt to limit its holding...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
As an update to our March 8, 2022 blog post discussing coverage for phishing scams in the context of Ernst & Haas Mgt. Co. v. Hiscox, Inc., 23 F.4th 1195 (9th Cir. 2022), a new Alaska case relied on Ernst & Haas to find...more
The “war” exclusion has gotten more attention over the past couple of weeks in light of Russia’s invasion of Ukraine. For good reason. This exclusion, common in property and liability policies alike, typically eliminates...more
Jerich Beason & Whitney McCollum speak on this Cyberside Chat to discuss the recent Merck & Co. cyber insurance win and how this impacts future wars fought with cyber weapons such as the conflict in Ukraine. This case sets a...more
Ransomware attacks were already on the rise prior to the COVID-19 pandemic, but the prevalence of such cyberattacks substantially increased during the pandemic due, in part, to additional security risks associated with the...more
A New Jersey federal district court recently ruled that there was no coverage under a title agent's errors and omissions policy for losses resulting from an email phishing scam. In Authentic Title Services, Inc. v. Greenwich...more
Social engineering scams seeking to deceive companies into making wire transfers to fraudulent bank accounts continue to plague companies. According to the FBI, social engineering fraud costs businesses billions of dollars...more
An insurer recently secured a ruling that it had no obligation to cover a loss incurred as a result of an email phishing scam. In Midlothian Enterprises, Inc. v. Owners Insurance Company, No. 3:19-cv-51 (E.D. Va. Feb. 20,...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
As cyber risks continue to proliferate, issues concerning coverage for those exposures under non-cyber or "traditional" property and casualty policies are creating uncertainty for both the insurance industry and for...more
Cyberattacks are an increasingly frequent and costly risk faced by almost every business today. While the availability and scope of cyber-specific insurance has developed exponentially over the past few years, it is important...more
Companies of all sizes have fallen victim to attacks whereby fraudsters will use deceptive communications, such as spoofed emails, to trick an employee into transferring money into the fraudsters’ control. While these...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
Remember the “good” ol’ days when the run-of-the-mill theft involved someone physically taking something tangible? That is so 20th century. Now, thieves and fraudsters are able to use computers and the internet to carry out...more
The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more
This week Rosen Millennium Technology Group, the sister company to Rosen Hotels & Resorts, was sued by its insurance company, St. Paul Fire & Marine, which is denying coverage for a data breach that was discovered in 2016. ...more