Best Practices for Negotiating Manuscript Exclusions
D&O Insurance Myths (Part 2)
Law School Toolbox Podcast Episode 388: Listen and Learn – Policy Exclusions (Evidence)
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
Long-Term Effects of Russia/Ukraine on Insurance
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Wait, are we related? Well, that depends on the facts and circumstances of each Claim
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Ledgers and Law: Roadblocks Facing the Cannabis Industry
K&L Gates Triage: Emergency Preparedness and Response in Long Term Care - Part II
Prior & Pending Litigation
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
In Citizens Ins. Co. of Amer. v. Thermoflex Waukegan, LLC no. 20-05980 (N.D. Ill. Mar. 1, 2022), the United States District Court for the Northern District of Illinois rejected the application of three separate general...more
The Illinois Supreme Court ruled late last week in favor of a company seeking insurance coverage for defense of a lawsuit alleging the company had violated the Illinois Biometric Privacy Act (BIPA). The ruling in the case,...more
The Fourth Circuit recently affirmed a district court ruling that the Privacy exclusion in a series of business liability policies bars coverage for a claim arising out of the insured law firm’s alleged violation of the...more
This week in Horn v. Liberty Insurance Underwriters, Inc., 2019 U.S. Dist. LEXIS 90194 (S.D. Fla. May 30, 2019), the Florida district court held that an invasion of privacy exclusion under a claims-made policy prohibited...more
Issues of digital privacy are multi-faceted and extend far beyond the now-routine data breaches that make headlines. The digital collection, use, and storage of biometric information (fingerprints, retinal or iris scans,...more