Bar Exam Toolbox Podcast Episode 319: Spotlight on Torts (Part 3 – Strict and Vicarious Liability)
Compliance Tip of the Day: Avoiding CCO Liability
Podcast - Ohio State Senator Has a Bone to Pick with Court Ruling on Boneless Wings
The Chartwell Chronicles: Tort Reform
2022 FCA Year in Review and Emerging Trends for 2023
Blogging made him both the Pope and the Tom Hanks of D&O insurance - Legally Contented Podcast
Corporate Criminal Liability in South America
Hinshaw Insurance Law TV – Cybersecurity Third and Final Part: Ransomware
Law Brief®: David Pfeffer and Richard Schoenstein Discuss the Legal Implications of Infrastructure Collapses
Texas House Passes Pandemic Liability Protection Act
Roadmap to Joint Venture Agreements: Legal and Accounting Considerations
The Risk of Personal Injury Claims from COVID-19 and What to Do About It
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
What No Statutory COVID Immunity Means for Businesses
New Developments in the World of Section 230
False Claims Act Implications for PPP and Disaster Relief Loans: What Small Businesses Should Be Ready For
JONES DAY TALKS®: Riding the Green Bond Wave: Focus is on Standards as Volumes Surge
Blakes Continuity Podcast: Life Sciences: Liability and Immunity During COVID-19
A Discussion on the Kollaritsch v. Michigan State University Board of Trustees Decision
[WEBINAR] Automated Vehicle Pilot Project Risks and Smart Infrastructure
L’attribution de la responsabilité dans les contrats relatifs aux technologies en cas d’atteintes à la protection des données est une préoccupation croissante pour les entreprises canadiennes. Récemment, Blakes a publié la...more
Allocating liability for data breaches in technology contracts is a growing concern for Canadian businesses. Blakes recently launched the first edition of the Canadian Data Liability Study, which identifies and analyzes...more
On June 10th, Sheppard Mullin partner Carolyn Metnick and associate Esperance Becton, in collaboration with Marsh McLennan, presented the CLE webinar, “Navigating Healthcare Risks in a Rapidly Evolving Patient and Provider...more
On June 20, 2025, Texas Governor Greg Abbott signed SB 2610 into law, joining a growing number of states that aim to incentivize sound cybersecurity practices through legislative safe harbors. Modeled on laws in states like...more
In addition to the normal operational and legal risks associated with owning and managing portfolio companies, 2025 has introduced or exacerbated a wave of geopolitical and macroeconomic risks such as inflation, tariffs,...more
As integrating artificial intelligence into corporate operations accelerates, the rapid deployment of AI tools—often driven by executive and investor pressure—has outpaced the establishment of robust governance, compliance,...more
Wire transfer fraud has long been a popular target for cyber criminals. A case of first impression decided by the California Court of Appeal, Fourth Appellate District demonstrates the high stakes for victims of this...more
When planning a major design development project, whether it’s a corporate campus, data center, or mixed-use facility, deciding how much to invest in security can be a complex question. A practical, risk-based approach to...more
The SEC’s Division of Enforcement intends to remain a “cop on the beat,” and will refocus on traditional core enforcement areas, such as insider trading, accounting and disclosure fraud, market manipulation, and breaches of...more
The artificial intelligence (AI) landscape is evolving at a dizzying pace. Just as organizations were adapting to generative AI and its capabilities for creating content, a new paradigm has emerged. ...more
An English Court has recently decided that three insurance policies covering the same loss – data breach settlements arising from an incorrectly addressed email – provided a combined, cumulative limit of indemnity. While the...more
Wire transfer fraud is on the rise, and attorneys are increasingly becoming prime targets for cybercriminals. With billions lost annually to fraudulent transactions, legal professionals who fail to implement robust...more
Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more
In recent years, many organizations have implemented new policies on artificial intelligence (AI) use to help prevent bias, plagiarism, or use of AI tools that produce inaccurate or misleading information. Meanwhile, many...more
As we noted in Federal Cybersecurity Policy in 2025: What to Watch in Changing Times, key parts of the Cybersecurity Information Sharing Act of 2015 (CISA 2015), the United States’ foundational cybersecurity information...more
In Home Depot Inc. v. Steadfast Insurance Co., Home Depot learned the hard way a rule every DIY enthusiast knows: measure twice, cut once. It appears Home Depot’s measurements were off when it sized up its insurance needs,...more
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
The European Union has significantly overhauled its product liability regime with a new directive concerning liability for defective products (Product Liability Directive). EU member states have until December 9, 2026, to...more
The 2025 Consumer Electronics Show (CES) — one of the world’s most influential tech events — once again showcased groundbreaking innovations that are shaping the future of technology. I was among the over 141,000 attendees of...more
The EU is in the course of passing a range of new cyber security legislation which will apply to US businesses who provide services in the EU. One part of that legislative programme is the new Network and Information Security...more
The Productivity Paradox: Does more technology mean less growth? Is there scope to use AI in commercial contracts? Will it save time, or ultimately cost more time in review and pose greater risk?...more
Our Consumer Protection/FTC and Privacy, Cyber & Data Strategy teams unpack Starwood Hotels’ and Marriott International’s settlements with the Federal Trade Commission and Marriott’s settlement with state attorneys general...more
You might have yet to hear of the NIS2 Directive, but you should be aware of it if you’re in any sector that relies on digital infrastructure. Whether you’re a business owner, IT professional, or curious about how the EU...more
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
Managing these risks at a single company should be straightforward. Executives and CISOs may be personally held accountable for cyber failings, negligence, breaches, and inadequate disclosure around cyber vulnerabilities and...more