Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
The Calm Before and After the Storm: How to Maximize Insurance Recovery for Catastrophic Weather Events
Protect Your Construction Project: Top 10 Insurance Provisions to Know
Filing Insurance Claims After the Texas Winter Storm
Subro Sense - The ABC's of RCV and ACV
K&L Gates Triage: Emergency Preparedness and Response in Long Term Care - Part II
What Money Damages Are Available In A Personal Injury Claim?
Welcome to our fourth issue of 2024 for our construction industry insights e-newsletter - The Site Report. In our Ask the Attorney segment at the bottom of this e-newsletter, we introduce you to Todd Biddle, Member in...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
Cyber attacks are now commonplace. Ransomware attacks, in particular, have skyrocketed in frequency and size. High-profile data breaches have cost businesses in the United States millions of dollars in losses and incalculable...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
As connected cars proliferate, auto, tech and financial companies will form alliances that raise familiar legal issues in new contexts - An estimated 125 million connected passenger cars are expected to ship worldwide by...more
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
Expanding the Boundaries of Coverage in the Face of Evolving Risks - Advances in technology, social change, new regulations—developments like these challenge companies’ risk-mitigation efforts and insurance programs. As the...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
Welcome to the latest edition of Pillsbury’s Perspectives on Insurance Recovery. As this 2015 edition of Perspectives demonstrates, our team is working on the most challenging issues—from cyber-insurance and complex claims...more