The Duty to Cooperate Under a Liability Policy
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
D&O Insurance Myths (Part 2)
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
Still Looking: How to Find Those Missing Policies Covering Long Tail Liabilities
Jeremy Levy on Recent RWI Challenges and Near-term Outlook
Protect Your Construction Project: Top 10 Insurance Provisions to Know
Filing Insurance Claims After the Texas Winter Storm
Lowenstein’s New Insurance Recovery Podcast Series, “Don’t Take No for an Answer”
JONES DAY TALKS®: COVID-19 and Business Insurance
Cyber Insurance 101: What It Is And Why You Need It
At this point, your IT department has almost certainly warned you to approach your e-mail inbox with skepticism--for good reason. Cybercriminals regularly and effectively impersonate our legitimate contacts for illegitimate...more
The most significant coverage issue facing the fidelity industry today is the scope of causation. Whether a court applies a “direct means direct” or a tort-based proximate cause standard often is the deciding factor in...more
You are on the accounts payable staff of a private company. It is 4:30 Friday afternoon, and you receive an urgent email from the CEO (Mrs. Banks). In this urgent email, Mrs. Banks directs you, in no uncertain terms, to...more
In this month's edition of our Privacy & Cybersecurity Update, we examine Brazil's new data protection regulation, the French data protection authority's warning to two companies of potential GDPR violations and the U.S....more
The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more