Best Practices for Negotiating Manuscript Exclusions
D&O Insurance Myths (Part 2)
Law School Toolbox Podcast Episode 388: Listen and Learn – Policy Exclusions (Evidence)
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
Long-Term Effects of Russia/Ukraine on Insurance
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Wait, are we related? Well, that depends on the facts and circumstances of each Claim
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Ledgers and Law: Roadblocks Facing the Cannabis Industry
K&L Gates Triage: Emergency Preparedness and Response in Long Term Care - Part II
Prior & Pending Litigation
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
In Citizens Ins. Co. of Amer. v. Thermoflex Waukegan, LLC no. 20-05980 (N.D. Ill. Mar. 1, 2022), the United States District Court for the Northern District of Illinois rejected the application of three separate general...more
An Illinois state appellate court recently ruled that a customer's biometric privacy class action claims against an insured tanning salon potentially fell within two insurer's personal injury coverage. See, West Bend Mutual...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
Cyber due diligence is quickly becoming the “new normal” for buyers in M&A transactions as they seek to protect themselves against cyber risk. Cyber due diligence, however, is only part of the solution. Many sophisticated...more
Issues of digital privacy are multi-faceted and extend far beyond the now-routine data breaches that make headlines. The digital collection, use, and storage of biometric information (fingerprints, retinal or iris scans,...more