The Duty to Cooperate Under a Liability Policy
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
Law School Toolbox Podcast Episode 388: Listen and Learn – Policy Exclusions (Evidence)
Nonprofit Basics: Insurance Coverage for the New Nonprofit
Tax Liability Insurance Products: A Hidden Gem in the Transactional Lawyer’s Tool Box
Asset Protection 101: Are You and Your Family Protected from Litigation, Creditors, and Divorce?
Subro Sense Podcast - Considerations In Fixed Funds/Limited Pool Scenarios
JONES DAY PRESENTS®: Insurance Implications of the California Consumer Privacy Act
Prior & Pending Litigation
In our new webinar series, Risk Management for Your Life Sciences Company, we discuss the insurance and risk management milestones life science companies should prepare for as they move from early funding through clinical...more
Is your cyber insurance policy sufficient to protect your company? As criminals leverage AI and other emerging technologies to exploit vulnerabilities in cybersecurity defenses, it’s critical to assess your company’s...more
Longer-term remote work impacts companies’ risk exposures and coverage under many insurance programs. Policy terms may no longer align with the “facts on the ground” of remote operations, which could lead to coverage gaps...more
2018 was the year of hearing from clients that they are convinced that they “have cyberliability insurance” to finding out that they really don’t have the coverage that they need for the most common cyber risks....more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
There’s a tempest amidst the recent spring shower of “cyber” insurance cases. It isn’t the Recall Total case reported the week before last, or the Travelers v. Federal Recovery Services case reported the week before. While...more
All employers have personnel data on their information technology systems and devices. This data includes personally identifiable information such as names, addresses, birth dates and Social Security numbers of employees and...more