Best Practices for Negotiating Manuscript Exclusions
D&O Insurance Myths (Part 2)
Law School Toolbox Podcast Episode 388: Listen and Learn – Policy Exclusions (Evidence)
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
Long-Term Effects of Russia/Ukraine on Insurance
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Wait, are we related? Well, that depends on the facts and circumstances of each Claim
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Ledgers and Law: Roadblocks Facing the Cannabis Industry
K&L Gates Triage: Emergency Preparedness and Response in Long Term Care - Part II
Prior & Pending Litigation
In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more
The US Internet Crime Complaint Center (IC3) received more than 880,000 cybercrime complaints in 2023. Overall financial losses from cybercrime last year reached $12.5 billion, a record-setting year-over-year increase of...more
New and comprehensive privacy and cyber regulations continue to proliferate across the globe. These are not your father’s data breach notification laws. The scope of information included within these mandates has expanded...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
Welcome to our second Roundup of 2017, where we feature the cases litigated and settlements finalized during the second calendar quarter of the year. It was a very active quarter in almost all of the categories we monitor,...more
If you read any newspaper, trade publication or twitter feed, you know that ongoing concerns regarding cyber security continue to grow. We have seen an article in the New York Times discussing hacking of major law firms with...more
In April 2013, Glens Falls Hospital admitted that the medical records for more than 2,300 of its patients were stored for several months on an unprotected computer server. The hospital’s outside records contractor, Portal...more
It is an otherwise normal day until you, the General Counsel, receive a call from the CIO: “We have a cyber-security breach. We’ve identified some unusual activity and it appears that data has been sent out through unknown...more
Private equity fund sponsors are facing increased litigation risk from regulators and private parties, including limited partners and stakeholders in portfolio companies. As a result, private equity firms should re-examine...more