The Road to Regulation: Vehicle Service Contracts Explained — Moving the Metal: The Auto Finance Podcast
AI Today in 5: August 11, 2025, The ACHILLES Project Episode
AI Today in 5: August 8, 2025, The Don’t Wait Episode
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 244: The Future of Independent Physician Practices with Ray Waldrup of The Leaders Rheum
Innovation in Compliance: Integrating AI in Compliance and Risk Management with Jana Brost
The Standard Formula Podcast | Assessing Prudential Solvency Regimes in the Middle East
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Innovation in Compliance: Strategic Compliance in Regulated Industries with Kerri Reuter
The Standard Formula Podcast | Assessing Prudential Insurance Regulation in Japan
The Standard Formula Podcast | Unpacking the IAIS’ Adoption of the Insurance Capital Standard
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
AGG Talks: Healthcare Insights Podcast - Episode 7: National MultiPlan Litigation: A Guide for Healthcare Providers
Loading and Unloading Under GL and Auto Policies: 2024
The Duty to Cooperate Under a Liability Policy
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
The Standard Formula Podcast | The SFCR and Other Public Reporting: A Solvency II Cornerstone
The Standard Formula Podcast | Insurers in Difficulty: Staying Compliant Under Solvency II
Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
The New York State Department of Financial Services (NYDFS) announced on August 14, 2025, resolution of civil enforcement action requiring Healthplex, Inc., a licensed insurance agent and independent adjuster, to pay a $2...more
On Aug. 14, 2025, the New York Department of Financial Services (NYDFS) issued a Consent Decree announcing that Healthplex, Inc. (Healthplex) has agreed to pay a $2 million fine, as a result of an investigation into a 2021...more
The European Union’s Digital Operational Resilience Act (DORA) came into effect on January 17, 2025. DORA aims to harmonise rules concerning the provision of information and communication technology (ICT) services to...more
On July 15, 2024, the California Privacy Protection Agency (CPPA) released proposed updates to the California Consumer Privacy Act (CCPA) regulations, including updates to the draft risk assessments, automated decisionmaking...more
When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford...more
The U.S. District Court for the Eastern District of Pennsylvania ruled that an insurance policy issued by Federal Insurance Co. excluded coverage for the transmission of $1.3 million by the insured in response to an email...more
In a decision with significant implications for policyholders seeking coverage for social engineering scams and cybercrime losses, the US Court of Appeals for the Ninth Circuit held in Ernst and Haas Management Company, Inc....more
Sovereign nation states have been behind (or suspected of being behind) some of the worst cyberattacks. When a cyberattack has state involvement, the inevitable question is whether it constitutes an act of war. The answer can...more
With more frequent and more severe ransomware attacks against health care platforms and vendors and the increasing use of telemedicine, it is critical to understand how to proactively defend your organization using robust...more
In G&G Oil Company of Indiana Inc. v. Continental Western Insurance Co., the Indiana Supreme Court considered the emerging area of computer crime coverage. ...more
Amid the demands of the COVID-19 pandemic, telemedicine became a vital resource for physicians and patients alike. Even with a potential “new normal” on the horizon, telemedicine is here to stay. But with the expansion of...more
In this month's edition, we examine the Court of Justice of the European Union's decision invalidating the EU-U.S. Privacy Shield framework, as well as the U.S. government's response to the decision. We also examine two...more
As cyber risks continue to proliferate, issues concerning coverage for those exposures under non-cyber or "traditional" property and casualty policies are creating uncertainty for both the insurance industry and for...more
Companies of all sizes have fallen victim to attacks whereby fraudsters will use deceptive communications, such as spoofed emails, to trick an employee into transferring money into the fraudsters’ control. While these...more
In this high tech era we live in, creating, storing and using data is commonplace. The sheer quantity and scope of data has made protecting that data of paramount importance. Yet, every day we hear about another data...more
The “WannaCry” and “NotPetya” computer viruses that infected computer systems around the world in 2017 sounded a wakeup call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies...more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
Fraudsters deploy different computer-related techniques but toward the same end – “gaming the system” for their own financial gain. Some victims turn to insurance for recovery. Four recent federal appellate decisions reveal...more
“Phishing” is a scheme in which criminals use spoofed e-mails, copycat websites, or other deceptive communications to trick unwitting companies or individuals into sharing valuable personal information or into wiring money to...more
Remember the “good” ol’ days when the run-of-the-mill theft involved someone physically taking something tangible? That is so 20th century. Now, thieves and fraudsters are able to use computers and the internet to carry out...more
As cybersecurity incidents continue to mount and as the issue of data security becomes increasingly important and a source of potential liability, companies should consider whether their standard commercial general liability...more
On March 1, 2018, the one year transition period within which banks, insurance companies, and other financial services institutions and licensees regulated by the New York Department of Financial Services (“Covered Entities”)...more
As cyber hacking and phishing schemes become more common, one issue that is often raised is whether, and to what extent, damages resulting from these incidents fall within the coverage afforded under a standard commercial...more
The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more