Latest Posts › Popular

Share:

Failure To Procure Cyber Insurance Could Haunt Your Company

A federal court in Florida recently adopted the now well-developed consensus that data breach losses are not covered under standard Commercial General Liability (CGL) policies....more

NAIC's New Cybersecurity Model Law Draft Is Still Flawed

Insurers are a prime target for hackers as a result of the vast stores of valuable data they maintain. Not all information is created equal, and it varies in value. Hacker services and software, illegal drugs, cyberweapons...more

New York Appellate Court Finds “Electronic Data” Exclusion Applies to Data Breach

The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more

Defining the Contours of Cyber Coverage for Data Breach: a Warning in Arizona

A year ago in this space, we looked at the receding wave of coverage litigation regarding whether various cyber-related exposures were covered under traditional policies, such as CGL and professional liability policies. ...more

As TCPA Class Actions Soar, Issues Emerge in TCPA Coverage for Claims

Both the number of cases under the Telephone Consumer Protection Act (TCPA) and the types of practices that those cases challenge have mushroomed within the last several years. Yet a dedicated form of insurance against TCPA...more

Phishing for Cybersecurity Coverage: When is a Fraud a “Computer Fraud”?

In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more

Cyber Risk as a Regulatory Issue: Tales of Encryption

Spurred by the prescient reporting found in this space (and, just maybe, by the Anthem data breach, which occurred a week later), insurance regulators have recently engaged in a flurry of regulatory activity relating to cyber...more

9 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide