Loading and Unloading Under GL and Auto Policies: 2024
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
D&O Insurance Myths (Part 2)
D&O Insurance Myths (Part 1)
Standard Formula Podcast | Reinsurance and Risk Transfer: Risk Mitigation Under the Solvency II Regime
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
Loading and Unloading Under GL and Auto Policies: 2022
D&O Insurance: Better to Have it And Not Need it Than Need it And Not Have it
Protect Your Construction Project: Top 10 Insurance Provisions to Know
NGE OnDemand: The Importance of Timely Reporting Occurrences, Claims and Suits to Insurers with Paul Walker-Bright
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
On-Demand Webinar | Insurance Issues Faced by Employers in Times of COVID-19
Ledgers and Law: Roadblocks Facing the Cannabis Industry
Navigating the New Normal: Risk Management and Legal Considerations for Real Estate Companies
What to Do When Your Insurance Carrier Says No: How to Protect Yourself from Coverage Denials
We have previously written on the evolving risks associated with PFAS—also known as “forever chemicals”—and their implications for policyholders navigating environmental liabilities involving both PFAS and PFAS-related...more
After a brief abatement due to pandemic-related litigation delays and court closures, social inflation returned with a vengeance replete with numerous nuclear jury verdicts. Although a case in any state is capable of...more
When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
The past 20 months have created a lot of transitions in how people work. Some companies still have the majority of their employees working remotely and intend to keep it that way permanently. Other businesses have tried to...more
Evolving climate change data presents an ominous trend that has the potential to upend historical assumptions of actuarial science. For example, in the last several years global risk markets have weathered historically...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
As more companies purchase cyber insurance to protect against the risks of computer hacking and data breaches, the body of law interpreting these policies is evolving rapidly. Risk managers and counsel should monitor these...more
The strategic importance and economic value of intellectual property (“IP”) can hardly be overstated in today’s global marketplace. Recognizing this, companies devote considerable time and resources to protect their vital IP...more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
In recent years, courts in several states have held that a general contractor's commercial general liability ("CGL") insurance policy may provide coverage for damage caused by a subcontractor's defective construction work....more
Despite the existence of cybersecurity insurance, companies still seek coverage for cyber liability under various types of other insurance. Carriers, in turn, rely upon broad exclusions to limit coverage for risks never...more
Businesses are increasingly purchasing dedicated cyber insurance policies to address their cyber and data security exposures. To date, however, many of the judicial decisions addressing insurance for cyber exposures have done...more
As cybersecurity incidents continue to mount and as the issue of data security becomes increasingly important and a source of potential liability, companies should consider whether their standard commercial general liability...more
As cyber hacking and phishing schemes become more common, one issue that is often raised is whether, and to what extent, damages resulting from these incidents fall within the coverage afforded under a standard commercial...more
Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more
In Part I of this two-part series, I identified first-party and third-party insurance claims that could result from a cyber event or attack on the Smart Grid. In this part, I examine how insurance policy language governs...more
Today’s political climate is rife with reminders about the importance of data privacy and cybersecurity. According to the World Economic Forum’s 2017 Global Risks Report, the greatest technological risks facing the world...more
One of the principal points of contention between insurers and insureds is whether defective construction work is, or can be, an occurrence, thereby triggering coverage. Originally published in ConsensusDocs (Vol. 3,...more
Are you covered? Here are 6 things to know about cyber liability insurance (also known as data breach insurance): Coverage is still evolving. Over 60 insurance companies – maybe more – offered such a policy; however,...more
As this blog has reported, a line of cases deciding coverage disputes over faulty workmanship runs against (or, at least, around) a basic rule for interpreting insurance policies. Under that rule, the scope of coverage is...more
Many an unhappy modern tale arises when a cyber predator suggests to his victim that they transition their dealings from the virtual world to a meeting “IRL” – “in real life.” But the perils that arise when the internet...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more
A year ago in this space, we looked at the receding wave of coverage litigation regarding whether various cyber-related exposures were covered under traditional policies, such as CGL and professional liability policies. ...more