The Duty to Cooperate Under a Liability Policy
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
Policyholders vs. Insurers: 3 Arguments to Make When Selecting Defense Counsel & Hourly Rates
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Insurers Take Note: New Changes to Florida Law Mean Changes in Claims Handling & Roof Repairs in the Sunshine State
An Uncompromising Insurer: What is a Policyholder to Do?
Five Tips to Improve Your Insurance Coverage Claim
Is Captive Insurance Right for Your Business? A Deep Dive with AkinovA
A Deeper Dive Into Insurance Topics for Nonprofits: Special Events Coverage and Considerations When Making Claims
Nonprofit Basics: Insurance Coverage for the New Nonprofit
Loading and Unloading Under GL and Auto Policies: 2022
Sending Up the Mediation Smoke Signal: Tools that Policyholders Have Available to Settle A Claim With A Recalcitrant Insurer
The Calm Before the Storm: Planning for Catastrophic Weather Events
Insurance Renewals: Know When to Hold ‘ Em, Know When to Walk Away
Do R&W Insurers Still Pay Claims? Following Up on Lowenstein’s 2020 Survey
Hinshaw Insurance Law TV: Recent Changes in Florida Property Insurance Law and How They Will Affect First Party Insurance
A June 16 appellate decision involving the construction of a cyberinsurance policy demonstrates a concerning lack of judicial understanding about the nature and scope of cyber liability coverage and implicitly incentivizes...more
In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more
An English Court has recently decided that three insurance policies covering the same loss – data breach settlements arising from an incorrectly addressed email – provided a combined, cumulative limit of indemnity. While the...more
Wire transfer fraud is on the rise, and attorneys are increasingly becoming prime targets for cybercriminals. With billions lost annually to fraudulent transactions, legal professionals who fail to implement robust...more
Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
A strong cyber insurance program is a critical risk management tool for companies, regardless of size or industry focus. When properly crafted, cyber insurance should protect a company against the costs of investigating cyber...more
Over the last decade, one of the most common gripes I’ve heard about cyber insurance is that policies “don’t pay out.” Cyber coverage is often perceived as being illusory and riddled with “gotcha” clauses. This isn’t the...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
The Appellate Court of Illinois, First District, applying Illinois law, has held that a cyber policy did not afford coverage for an underlying lawsuit alleging violations of the Biometric Information Privacy Act (BIPA)...more
In Part I of this series, we posed a series of questions to consider when purchasing cyber insurance. Our approach was deliberate: the right questions help get you the right insurance to address cyber risks facing your...more
Cyber risk is now a normal part of our personal and professional lives. When companies suffer a cyber incident, they often look to their insurance policy for coverage to help mitigate the financial exposure. Additional...more
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
The Superior Court of Delaware, applying Delaware law, has dismissed two lawsuits filed by nine insurance companies seeking to recover amounts they paid under cyber liability policies from a software company whose customers...more
On May 8, 2024, Paul Hastings hosted the Cybersecurity Law Workshop at this spring’s Privacy + Security Forum featuring a panel on cybersecurity insurance trends and insights. The panel was moderated by Paul Hastings’ David...more
The Fifth Circuit added to the emerging body of case law addressing the recovery of business income losses in the cyber insurance coverage context to kick-start 2024 in Southwest Airlines Company v. Liberty Insurance. ...more
Twenty years ago the federal government designated October as Cybersecurity Awareness Month, part of an early effort to promote a wider appreciation of computer-related threats to business and government operations and to...more
In this episode of “Don't Take No for an Answer,” host Lynda A. Bennett is joined by David Anderson, Vice President of Cyber at Woodruff Sawyer, and Heather Weaver, counsel in Lowenstein’s Insurance Recovery Group, to discuss...more
Cyber insurance is more important than ever, says Eric Jesse, who provides three tips for deriving the most value possible from your cyber insurance policy. Eric advises policyholders to clearly understand the scope of their...more
In Short: The Situation: The cyber insurance market is experiencing a major retrenchment, with insurers seeking to limit their exposure in a variety of ways....more
While cyber was incorporated in some general liability policies (GL) of the 1980s, the first cyber standalone policy was written in 1997 through AIG. Though groundbreaking, as it was the first to address cybersecurity, it was...more
Reps and warranties insurance (RWI) ensures the policyholder is covered for breach of contract for mergers and acquisition (M&A) transactions. Failures in diligence or fraud on the part of the seller can result in breaches of...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
In the second of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management, and Bryan Schauer, Vice President at The Schauer Group’s...more
With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...more