The Road to Regulation: Vehicle Service Contracts Explained — Moving the Metal: The Auto Finance Podcast
AI Today in 5: August 11, 2025, The ACHILLES Project Episode
AI Today in 5: August 8, 2025, The Don’t Wait Episode
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 244: The Future of Independent Physician Practices with Ray Waldrup of The Leaders Rheum
Innovation in Compliance: Integrating AI in Compliance and Risk Management with Jana Brost
The Standard Formula Podcast | Assessing Prudential Solvency Regimes in the Middle East
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Innovation in Compliance: Strategic Compliance in Regulated Industries with Kerri Reuter
The Standard Formula Podcast | Assessing Prudential Insurance Regulation in Japan
The Standard Formula Podcast | Unpacking the IAIS’ Adoption of the Insurance Capital Standard
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
AGG Talks: Healthcare Insights Podcast - Episode 7: National MultiPlan Litigation: A Guide for Healthcare Providers
Loading and Unloading Under GL and Auto Policies: 2024
The Duty to Cooperate Under a Liability Policy
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
The Standard Formula Podcast | The SFCR and Other Public Reporting: A Solvency II Cornerstone
The Standard Formula Podcast | Insurers in Difficulty: Staying Compliant Under Solvency II
Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
On Aug. 14, 2025, the New York Department of Financial Services (NYDFS) issued a Consent Decree announcing that Healthplex, Inc. (Healthplex) has agreed to pay a $2 million fine, as a result of an investigation into a 2021...more
After a brief abatement due to pandemic-related litigation delays and court closures, social inflation returned with a vengeance replete with numerous nuclear jury verdicts. Although a case in any state is capable of...more
When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford...more
The issuance of various governmental orders requiring businesses to temporarily modify or close their operations during the COVID-19 pandemic led to an immediate avalanche of claims and lawsuits involving first-party...more
In a decision with significant implications for policyholders seeking coverage for social engineering scams and cybercrime losses, the US Court of Appeals for the Ninth Circuit held in Ernst and Haas Management Company, Inc....more
Sovereign nation states have been behind (or suspected of being behind) some of the worst cyberattacks. When a cyberattack has state involvement, the inevitable question is whether it constitutes an act of war. The answer can...more
In this month's edition, we examine the Court of Justice of the European Union's decision invalidating the EU-U.S. Privacy Shield framework, as well as the U.S. government's response to the decision. We also examine two...more
The “WannaCry” and “NotPetya” computer viruses that infected computer systems around the world in 2017 sounded a wakeup call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies...more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
Fraudsters deploy different computer-related techniques but toward the same end – “gaming the system” for their own financial gain. Some victims turn to insurance for recovery. Four recent federal appellate decisions reveal...more
“Phishing” is a scheme in which criminals use spoofed e-mails, copycat websites, or other deceptive communications to trick unwitting companies or individuals into sharing valuable personal information or into wiring money to...more
Remember the “good” ol’ days when the run-of-the-mill theft involved someone physically taking something tangible? That is so 20th century. Now, thieves and fraudsters are able to use computers and the internet to carry out...more
As cybersecurity incidents continue to mount and as the issue of data security becomes increasingly important and a source of potential liability, companies should consider whether their standard commercial general liability...more
As cyber hacking and phishing schemes become more common, one issue that is often raised is whether, and to what extent, damages resulting from these incidents fall within the coverage afforded under a standard commercial...more
Even when a claims administrator approves a claim for disability benefits, its job is not done. That principle was again demonstrated in the recent case Owings v. United of Omaha Life Insurance Co., No. 16-3128 (10th Cir....more
Welcome to our second Roundup of 2017, where we feature the cases litigated and settlements finalized during the second calendar quarter of the year. It was a very active quarter in almost all of the categories we monitor,...more
Even as Hurricane Harvey’s effects continue to unfold, Texas policyholders face another imminent threat. On September 1, 2017, a new Texas law becomes effective that dramatically limits insurance recoveries for Texan...more
In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more
In this edition of our Privacy & Cybersecurity Update, we look at a series of recent court rulings regarding standing in privacy cases, most of which suggest plaintiffs will continue to have a difficult time establishing...more
The Supreme Court of Washington recently held that the attorney-client privilege does not protect a corporation’s attorney’s communications with former employees of the corporation, even if the communications concern events...more
The Sixth Circuit joined the growing trend of appellate courts holding that plaintiffs had demonstrated standing for data breach class actions in Galaria et al. v. Nationwide Mutual Insurance Company. In a recent order, the...more
Last week, the Sixth Circuit held that allegations that personal information was stolen following a data breach was sufficient to confer Article III standing to sue to the affected individuals, even in the absence of...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more
As cyber attacks increase at an unprecedented pace, more and more businesses are purchasing cyber insurance to protect against that risk. The insurance industry now faces an avalanche of claims, and those claims now are...more
ArcView Group, which tracks the legal marijuana markets, recently estimated that legal U.S. pot sales could reach $6.7 billion in 2016. As the legal marijuana economy has grown, insurance coverage for this emerging industry...more