The Duty to Cooperate Under a Liability Policy
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
Policyholders vs. Insurers: 3 Arguments to Make When Selecting Defense Counsel & Hourly Rates
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Insurers Take Note: New Changes to Florida Law Mean Changes in Claims Handling & Roof Repairs in the Sunshine State
An Uncompromising Insurer: What is a Policyholder to Do?
Five Tips to Improve Your Insurance Coverage Claim
Is Captive Insurance Right for Your Business? A Deep Dive with AkinovA
A Deeper Dive Into Insurance Topics for Nonprofits: Special Events Coverage and Considerations When Making Claims
Nonprofit Basics: Insurance Coverage for the New Nonprofit
Loading and Unloading Under GL and Auto Policies: 2022
Sending Up the Mediation Smoke Signal: Tools that Policyholders Have Available to Settle A Claim With A Recalcitrant Insurer
The Calm Before the Storm: Planning for Catastrophic Weather Events
Insurance Renewals: Know When to Hold ‘ Em, Know When to Walk Away
Do R&W Insurers Still Pay Claims? Following Up on Lowenstein’s 2020 Survey
Hinshaw Insurance Law TV: Recent Changes in Florida Property Insurance Law and How They Will Affect First Party Insurance
In connection with the increase in the number of incidents and attacks, the scope and impact of the incidents and attacks are also growing. With the rise in frequency and impact of cybersecurity incidents and cybercrimes,...more
Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
Commercial insurance pricing trends in the first quarter of 2024 followed many of the same patterns as last year. Insurance buyers can still expect competitive premiums in D&O and Cyber despite several insurers publicly...more
In a win for Wiley’s client, the United States District Court for the Eastern District of Arkansas, applying Arkansas law, has held that a cyber policy’s business interruption coverage should not result in a windfall for an...more
Small businesses account for 99.9 percent “of all American businesses,” with more than 33.1 million small businesses employing a staggering 61.7 million Americans. There is nothing “small” about their import to the economy or...more
Twenty years ago the federal government designated October as Cybersecurity Awareness Month, part of an early effort to promote a wider appreciation of computer-related threats to business and government operations and to...more
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline...more
Where companies are victimized by ransomware or email scams, their losses arise from payments made by an officer or employee of the company. In the case of ransomware, a company’s files are held hostage pending payment...more
In EMOI Services LLC v. Owners Insurance Co., No. 2021-1529 (Ohio Dec. 27, 2022), the Ohio Supreme Court found that there was no coverage for a ransomware attack because there was no direct physical loss as required under the...more
In a unanimous decision, the Ohio Supreme Court found that appellee EMOI Services, LLC’s (“EMOI”) businessowners insurance policy does not cover losses resulting from a ransomware attack on EMOI’s computer software systems....more
In the last week of December 2022, the Ohio Supreme Court published a much-anticipated decision in the EMOI Services LLC v. Owners Insurance Co. case. The decision was bold, and the court made no attempt to limit its holding...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
In the second of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management, and Bryan Schauer, Vice President at The Schauer Group’s...more
The war exclusion has received a lot of attention over the past year, particularly since Russia invaded Ukraine in February. Policyholders’ concern that insurers will assert the exclusion as a basis to deny coverage is...more
Healthcare breaches, including ransomware attacks, continue to increase. As a result, many healthcare organizations seeking cyber coverage to help defray the costs associated with a ransomware attack or other data incident...more
Host Lynda A. Bennett is joined by Robert DiRico, National Cyber Liability Practice Leader at ARC Excess & Surplus, LLC, and Shiraz Saeed, Vice President and Cyber Risk Product Leader at Arch Insurance Group, for a deep dive...more
Introduction - Cryptocurrency, such as Bitcoin, is a decentralized and exclusively virtual currency that is secured through cryptography. Companies using or investing in cryptocurrency face various risks, such as market...more
In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more
The “war” exclusion has gotten more attention over the past couple of weeks in light of Russia’s invasion of Ukraine. For good reason. This exclusion, common in property and liability policies alike, typically eliminates...more
As businesses continue to rely on computers and digital storage of important data, cyberattacks are a growing potential threat to these organizations—especially now, as businesses have transitioned their workforces to work...more
This paper will cover the application of digital forensics, the types of data digital forensics experts work with, the investigation process, and some example scenarios wherein digital forensics experts are called to help...more
Ransomware attacks continue to challenge U.S. companies, with cybercriminals now routinely extorting companies for multimillion-dollar payouts. A company that experiences an attack will likely seek coverage under its cyber...more
Cyber Insurance: Policyholder Obligations After the Claim Is Paid - Policyholders and, in turn, cyber insurers have been facing more frequent ransomware attacks. As a result, cyber insurers may try to recoup losses they...more
We are still in the relatively early stages of jurisprudence addressing the insurability of loss stemming from data breaches. Compared to the more developed body of case law interpreting coverage provisions and exclusions...more