The Duty to Cooperate Under a Liability Policy
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
Policyholders vs. Insurers: 3 Arguments to Make When Selecting Defense Counsel & Hourly Rates
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Insurers Take Note: New Changes to Florida Law Mean Changes in Claims Handling & Roof Repairs in the Sunshine State
An Uncompromising Insurer: What is a Policyholder to Do?
Five Tips to Improve Your Insurance Coverage Claim
Is Captive Insurance Right for Your Business? A Deep Dive with AkinovA
A Deeper Dive Into Insurance Topics for Nonprofits: Special Events Coverage and Considerations When Making Claims
Nonprofit Basics: Insurance Coverage for the New Nonprofit
Loading and Unloading Under GL and Auto Policies: 2022
Sending Up the Mediation Smoke Signal: Tools that Policyholders Have Available to Settle A Claim With A Recalcitrant Insurer
The Calm Before the Storm: Planning for Catastrophic Weather Events
Insurance Renewals: Know When to Hold ‘ Em, Know When to Walk Away
Do R&W Insurers Still Pay Claims? Following Up on Lowenstein’s 2020 Survey
Hinshaw Insurance Law TV: Recent Changes in Florida Property Insurance Law and How They Will Affect First Party Insurance
In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more
Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more
A Jan. 13 decision out of the U.S. Court of Appeals for the Sixth Circuit is one more nail in the coffin of "silent cyber." In Home Depot Inc. v. Steadfast Insurance Co., the federal appellate court agreed with the lower...more
At this point, your IT department has almost certainly warned you to approach your e-mail inbox with skepticism--for good reason. Cybercriminals regularly and effectively impersonate our legitimate contacts for illegitimate...more
Our company experienced a cybersecurity incident. It seemed pretty minor — just a few suspicious emails and an employee’s account being locked. To my dismay, we’re now hearing from our IT team that the issue is more serious....more
Over the last decade, one of the most common gripes I’ve heard about cyber insurance is that policies “don’t pay out.” Cyber coverage is often perceived as being illusory and riddled with “gotcha” clauses. This isn’t the...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
On May 8, 2024, Paul Hastings hosted the Cybersecurity Law Workshop at this spring’s Privacy + Security Forum featuring a panel on cybersecurity insurance trends and insights. The panel was moderated by Paul Hastings’ David...more
Twenty years ago the federal government designated October as Cybersecurity Awareness Month, part of an early effort to promote a wider appreciation of computer-related threats to business and government operations and to...more
Insurance coverage for cyberattacks can be tricky for anyone to navigate, including lawyers. To illustrate this point, a case in New Jersey caught my eye that I thought would be an interesting read for our followers who are...more
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline...more
In Short: The Situation: The cyber insurance market is experiencing a major retrenchment, with insurers seeking to limit their exposure in a variety of ways....more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
Healthcare breaches, including ransomware attacks, continue to increase. As a result, many healthcare organizations seeking cyber coverage to help defray the costs associated with a ransomware attack or other data incident...more
In this episode, partners Jeff Meagher and Lucas Tanglen, along with associate Reymond Yammine, discuss the Russia-Ukraine conflict and insurance for state-sponsored cyberattacks, including lessons learned from the NotPetya...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
Pharmaceutical giant Merck won a major victory over its insurance carrier in New Jersey Superior Court recently. Merck’s victory means its carrier is liable to pay out up $1.4 billion to Merck for alleged losses arising out...more
We are still in the relatively early stages of jurisprudence addressing the insurability of loss stemming from data breaches. Compared to the more developed body of case law interpreting coverage provisions and exclusions...more
Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more
We have all heard about the alarming and ever increasing number of security breaches and ransomware attacks facing businesses. With bad actors continuously evolving and presenting new risks, most companies now fortunately...more
This episode is a continuation of Lynda’s conversation with Bridget Choi, Deputy Counsel and Managing Director of Strategy at Kivu Consulting, and David Anderson, VP within Lockton Insurance’s Cyber Technology Group, about...more
The fallout from the SolarWinds hacking incident linked to Russian threat actors has not only wreaked havoc on governmental agencies and private companies whose data are at risk following the incident, but this week, Bitsight...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
Cyberattacks are an increasingly frequent and costly risk faced by almost every business today. While the availability and scope of cyber-specific insurance has developed exponentially over the past few years, it is important...more
We all know that businesses rely on a large number of third-party vendors to support their business operations. Many of these third parties require access to a company’s data and its internal information and technology...more