Best Practices for Negotiating Manuscript Exclusions
D&O Insurance Myths (Part 2)
Law School Toolbox Podcast Episode 388: Listen and Learn – Policy Exclusions (Evidence)
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
Long-Term Effects of Russia/Ukraine on Insurance
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Wait, are we related? Well, that depends on the facts and circumstances of each Claim
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Ledgers and Law: Roadblocks Facing the Cannabis Industry
K&L Gates Triage: Emergency Preparedness and Response in Long Term Care - Part II
Prior & Pending Litigation
New and comprehensive privacy and cyber regulations continue to proliferate across the globe. These are not your father’s data breach notification laws. The scope of information included within these mandates has expanded...more
As states push to re-open, retailers will be balancing the welcome prospect of renewed business and cash flow against the fear and cost of claims that could be made against them by customers, vendors, subcontractors, and...more
Many employers purchase Employment Practices Liability Insurance (EPLI) to insure against loss as a result of employment claims. However, employers who do not carefully read their policies could be surprised by what is (or is...more
A recent decision by the Superior Court of the State of Delaware highlights a risk of potential exposure to liability for individuals affiliated with private equity firms who are presumed to be covered by a directors’ and...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential...more