Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
The Calm Before and After the Storm: How to Maximize Insurance Recovery for Catastrophic Weather Events
Protect Your Construction Project: Top 10 Insurance Provisions to Know
Filing Insurance Claims After the Texas Winter Storm
Subro Sense - The ABC's of RCV and ACV
K&L Gates Triage: Emergency Preparedness and Response in Long Term Care - Part II
What Money Damages Are Available In A Personal Injury Claim?
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
Cyber attacks are now commonplace. Ransomware attacks, in particular, have skyrocketed in frequency and size. High-profile data breaches have cost businesses in the United States millions of dollars in losses and incalculable...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
In November, Tyler wrote about insurance issues raised by both the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act, which goes into effect on January 1, 2020. California’s...more
Last week, Hurricane Michael devastated the Florida Panhandle. The hurricane was the third strongest to strike the United States and the largest to ever make landfall on the Florida Panhandle. Some of Florida’s most historic...more
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
Expanding the Boundaries of Coverage in the Face of Evolving Risks - Advances in technology, social change, new regulations—developments like these challenge companies’ risk-mitigation efforts and insurance programs. As the...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more
In recent years, there has been no shortage of news about large-scale data privacy breaches; incidents that have affected tens of millions of consumers nationwide. Those incidents have spurred a growing market for so-called...more
Welcome to the latest edition of Pillsbury’s Perspectives on Insurance Recovery. As this 2015 edition of Perspectives demonstrates, our team is working on the most challenging issues—from cyber-insurance and complex claims...more