AGG Talks: Healthcare Insights Podcast - Episode 4: What to Do When Insurance Companies Deny Behavioral Health Claims
Best Practices for Negotiating Manuscript Exclusions
Coverage Issues Arising Out of Assault and Battery Claims
Long-Term Effects of Russia/Ukraine on Insurance
Mediating Complex Insurance Coverage Disputes Series Part 3 – Breaking the Log Jam
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Mediating Complex Insurance Coverage Disputes Series Part 2 – What Goes on in Mediation?
Mediating Complex Insurance Coverage Disputes Series Part 1 – Preparing For The Mediation
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Settling a Claim: Get Comfortable With Being Uncomfortable
NGE OnDemand: The Importance of Timely Reporting Occurrences, Claims and Suits to Insurers with Paul Walker-Bright
Lowenstein’s New Insurance Recovery Podcast Series, “Don’t Take No for an Answer”
Ledgers and Law: Roadblocks Facing the Cannabis Industry
Subro Sense - The ABC's of RCV and ACV
WEBINAR: COVID-19 Insurance Coverage Class Actions
What to Do When Your Insurance Carrier Says No: How to Protect Yourself from Coverage Denials
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
The Ohio Supreme Court waited until the last week of the year to issue what may be the most important silent coverage decision of 2022. Direct physical injury is a fundamental requirement of first-party property policies. The...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
The United States Court of Appeals for the Fifth Circuit, applying Texas law, held that an insurer owed a duty to defend its insured in an underlying litigation stemming from a payment card breach because it found that the...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
Cyberattacks are an increasingly frequent and costly risk faced by almost every business today. While the availability and scope of cyber-specific insurance has developed exponentially over the past few years, it is important...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more
This week Rosen Millennium Technology Group, the sister company to Rosen Hotels & Resorts, was sued by its insurance company, St. Paul Fire & Marine, which is denying coverage for a data breach that was discovered in 2016. ...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more