Fraud Prevention Techniques for Nonprofit Organizations - Part 3
Steps Your Nonprofit Can Take to Mitigate Fraud Risks - Part 2
Fraud Risks at Nonprofit Organizations - Part 1
Digital Planning Podcast Episode: Estate Planning and the Corporate Transparency Act
The Presumption of Innocence Podcast: Episode 38 - A Blueprint for Compliance: The Fraud Pentagon Theory
FCA Uncovered: Mitigating Risk in the Regulatory Spotlight — Regulatory Oversight Podcast
Tackling Credit Push Fraud: Understanding Nacha's Risk Management Package (Part Two) — Payments Pros: The Payments Law Podcast
False Claims Act Insights - Think You Know Whistleblowers? Think Again.
PilieroMazza Annual Review What DOJ’s Annual FCA Report Means for Government Contractors
Ad Law Tool Kit Show – Episode 6 – Mitigating Class Action Exposure
Compliance into the Weeds: The ACFE 2024 Anti-Fraud Technology Benchmarking Report
AD Nauseam: Cabbage Soup v. Keto Diet: The Evolving FTC and NAD Approach to Post-Holiday Weight Loss Claims
The Justice Insiders Podcast: The Sam Bankman-Fried Trial: Defendants Testifying (Poorly), FOMO, and How to Actually Blame Lawyers
Detecting Fraud in New Jersey Workers' Compensation
The Presumption of Innocence Podcast: Episode 25 - An Investigative Journalist’s Insight Into the COVID-19 Fraud Strike Force
Medical Device Legal News with Sam Bernstein: Episode 11
JONES DAY TALKS®: Looking for ESG Fraud – CFTC Solicits Carbon Markets Whistleblowers
ChatGPT Risks for Compliance Programs
The Justice Insiders Podcast: Varsity Blues Reversals Turn DOJ Red
Giving Compliance Advice
Most policyholders are aware of the danger of losses from fraudulent instructions and invoices accomplished through what is known as “social engineering” or related methods. Often this is carried out by an email claiming to...more
This is a deceptively simple question — risk managers rightfully expect to know the scope of their coverages when they build their insurance programs. Unfortunately, judicial interpretation of common policy terms can turn...more
At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline...more
Wire fraud threats have been on the rise in recent years, with Hong Kong becoming a particularly attractive destination for fraudsters due to its status as a global financial hub. Criminals are using increasingly...more
In this month’s Privacy & Cybersecurity Update, we review new consumer privacy laws in Tennessee and Indiana, three GDPR rulings by the Court of Justice of the European Union, updates regarding future California Privacy...more
When it comes to protecting your organization from cyber threats, Managed Detection and Response (MDR) services are a must. But many businesses overlook the importance of compliance and insurance needs associated with...more
A Minnesota federal district court has held that a software company is entitled to coverage for losses related to diverted billing emails under its business interruption coverage, rejecting the insurer’s argument that the...more
The Third Circuit Court of Appeals has given new life to a putative class action suit led by a former employee of a company that suffered a ransomware attack, leading to her sensitive information being released onto the Dark...more
Applying North Carolina law, a federal district court has held that an E&O insurance policy does not provide coverage for loss arising from social engineering fraud despite the fact that the insured’s negligence also...more
Consider the following two scenarios resulting in identical losses, but potentially two entirely different insurance coverage outcomes. In the first instance, a thief hacks, or gains unauthorized entry, into an insured’s...more
The start of a new year is always a good reminder to take some time to review key areas and assess whether changes are in order. There are many examples of this both personally and professionally, but a company’s insurance...more
What You Need To Know: - Recent case law is trending favorably for policyholders to secure coverage for computer fraud claims under a wide array of insurance policies. - Because several types of policies may be...more
Insurance Coverage – Computer Fraud – E-Mail "Spoofing" - Trick or Treat Editors' Note: Does anything cause deeper mortal terror than the prospect of an uncovered loss? In a tale that has an all-too infrequent happy ending...more
Insurance Coverage – Computer Fraud – E-Mail “Spoofing” - Medidata Sols., Inc. v. Fed. Ins. Co., 729 Fed. Appx. 117 (2d Cir. 2018), 2018 U.S. App. Lexis 18376, 2018 WL 3339245 - Risk Management Issue: Is e-mail “spoofing”...more
The Sixth Circuit recently entered a ruling in American Tooling Center, Inc. v. Travelers Casualty and Surety Co. of America, 2018 WL 3404708 (6th Cir. July 13, 2018), soundly rejecting a cyber carrier’s extremely narrow...more
The “business compromise email” is what the FBI calls the “$5 billion scam,” but apparently an insurance company did not agree with an insured company that they had been the victim of a crime....more
In the fast-developing world of cyber threats and corresponding cyber coverage, at least two insurance carriers are pushing back against covering losses arising out the transfer of funds to cyber fraudsters after employees...more
In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more
Insured's Notice to Broker Satisfied Policy Requirements, Illinois Court Rules - Why it matters: An insured's notice to its broker satisfied the policy's notice requirements, an Illinois appellate panel recently...more