The Road to Regulation: Vehicle Service Contracts Explained — Moving the Metal: The Auto Finance Podcast
AI Today in 5: August 11, 2025, The ACHILLES Project Episode
AI Today in 5: August 8, 2025, The Don’t Wait Episode
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 244: The Future of Independent Physician Practices with Ray Waldrup of The Leaders Rheum
Innovation in Compliance: Integrating AI in Compliance and Risk Management with Jana Brost
The Standard Formula Podcast | Assessing Prudential Solvency Regimes in the Middle East
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Innovation in Compliance: Strategic Compliance in Regulated Industries with Kerri Reuter
The Standard Formula Podcast | Assessing Prudential Insurance Regulation in Japan
The Standard Formula Podcast | Unpacking the IAIS’ Adoption of the Insurance Capital Standard
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
AGG Talks: Healthcare Insights Podcast - Episode 7: National MultiPlan Litigation: A Guide for Healthcare Providers
Loading and Unloading Under GL and Auto Policies: 2024
The Duty to Cooperate Under a Liability Policy
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
The Standard Formula Podcast | The SFCR and Other Public Reporting: A Solvency II Cornerstone
The Standard Formula Podcast | Insurers in Difficulty: Staying Compliant Under Solvency II
Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
We have previously written on the evolving risks associated with PFAS—also known as “forever chemicals”—and their implications for policyholders navigating environmental liabilities involving both PFAS and PFAS-related...more
After a brief abatement due to pandemic-related litigation delays and court closures, social inflation returned with a vengeance replete with numerous nuclear jury verdicts. Although a case in any state is capable of...more
When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
The past 20 months have created a lot of transitions in how people work. Some companies still have the majority of their employees working remotely and intend to keep it that way permanently. Other businesses have tried to...more
Evolving climate change data presents an ominous trend that has the potential to upend historical assumptions of actuarial science. For example, in the last several years global risk markets have weathered historically...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
As more companies purchase cyber insurance to protect against the risks of computer hacking and data breaches, the body of law interpreting these policies is evolving rapidly. Risk managers and counsel should monitor these...more
The strategic importance and economic value of intellectual property (“IP”) can hardly be overstated in today’s global marketplace. Recognizing this, companies devote considerable time and resources to protect their vital IP...more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
In recent years, courts in several states have held that a general contractor's commercial general liability ("CGL") insurance policy may provide coverage for damage caused by a subcontractor's defective construction work....more
Despite the existence of cybersecurity insurance, companies still seek coverage for cyber liability under various types of other insurance. Carriers, in turn, rely upon broad exclusions to limit coverage for risks never...more
Businesses are increasingly purchasing dedicated cyber insurance policies to address their cyber and data security exposures. To date, however, many of the judicial decisions addressing insurance for cyber exposures have done...more
As cybersecurity incidents continue to mount and as the issue of data security becomes increasingly important and a source of potential liability, companies should consider whether their standard commercial general liability...more
As cyber hacking and phishing schemes become more common, one issue that is often raised is whether, and to what extent, damages resulting from these incidents fall within the coverage afforded under a standard commercial...more
Your business has insurance coverage for flood and fire damage. You are protected if an employee gets into a car accident. But are you covered for a cyber attack?...more
In Part I of this two-part series, I identified first-party and third-party insurance claims that could result from a cyber event or attack on the Smart Grid. In this part, I examine how insurance policy language governs...more
Today’s political climate is rife with reminders about the importance of data privacy and cybersecurity. According to the World Economic Forum’s 2017 Global Risks Report, the greatest technological risks facing the world...more
One of the principal points of contention between insurers and insureds is whether defective construction work is, or can be, an occurrence, thereby triggering coverage. Originally published in ConsensusDocs (Vol. 3,...more
Are you covered? Here are 6 things to know about cyber liability insurance (also known as data breach insurance): Coverage is still evolving. Over 60 insurance companies – maybe more – offered such a policy; however,...more
As this blog has reported, a line of cases deciding coverage disputes over faulty workmanship runs against (or, at least, around) a basic rule for interpreting insurance policies. Under that rule, the scope of coverage is...more
Many an unhappy modern tale arises when a cyber predator suggests to his victim that they transition their dealings from the virtual world to a meeting “IRL” – “in real life.” But the perils that arise when the internet...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more
A year ago in this space, we looked at the receding wave of coverage litigation regarding whether various cyber-related exposures were covered under traditional policies, such as CGL and professional liability policies. ...more