The Duty to Cooperate Under a Liability Policy
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
Policyholders vs. Insurers: 3 Arguments to Make When Selecting Defense Counsel & Hourly Rates
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Insurers Take Note: New Changes to Florida Law Mean Changes in Claims Handling & Roof Repairs in the Sunshine State
An Uncompromising Insurer: What is a Policyholder to Do?
Five Tips to Improve Your Insurance Coverage Claim
Is Captive Insurance Right for Your Business? A Deep Dive with AkinovA
A Deeper Dive Into Insurance Topics for Nonprofits: Special Events Coverage and Considerations When Making Claims
Nonprofit Basics: Insurance Coverage for the New Nonprofit
Loading and Unloading Under GL and Auto Policies: 2022
Sending Up the Mediation Smoke Signal: Tools that Policyholders Have Available to Settle A Claim With A Recalcitrant Insurer
The Calm Before the Storm: Planning for Catastrophic Weather Events
Insurance Renewals: Know When to Hold ‘ Em, Know When to Walk Away
Do R&W Insurers Still Pay Claims? Following Up on Lowenstein’s 2020 Survey
Hinshaw Insurance Law TV: Recent Changes in Florida Property Insurance Law and How They Will Affect First Party Insurance
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
Twenty years ago the federal government designated October as Cybersecurity Awareness Month, part of an early effort to promote a wider appreciation of computer-related threats to business and government operations and to...more
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline...more
In Short: The Situation: The cyber insurance market is experiencing a major retrenchment, with insurers seeking to limit their exposure in a variety of ways....more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
Healthcare breaches, including ransomware attacks, continue to increase. As a result, many healthcare organizations seeking cyber coverage to help defray the costs associated with a ransomware attack or other data incident...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more
Ransomware attacks continue to challenge U.S. companies, with cybercriminals now routinely extorting companies for multimillion-dollar payouts. A company that experiences an attack will likely seek coverage under its cyber...more
Despite the great strides companies have made to mitigate the risks associated with security breaches, including putting insurance in place to cover those risks, cyber criminals have remained two steps ahead, finding new and...more
Ransomware attacks are on the rise. Lax security measures, which have become more acute in the work-from-home environment, continue to be exploited. Companies' systems are hacked into, their data is encrypted, and they face...more
Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more
Ransomware attacks were already on the rise prior to the COVID-19 pandemic, but the prevalence of such cyberattacks substantially increased during the pandemic due, in part, to additional security risks associated with the...more
A Maryland Federal Court Examines A Coverage Dispute Regarding Whether An Insured Had Experienced A Covered Loss To Its Computer System Following A Ransomware Attack. ...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
Cyber insurance policies are typically a company’s first line of defense following a cybersecurity event, but a recent decision from a federal court in Maryland illustrates why businesses should always look for cyber coverage...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
Now that the CCPA is in effect, some companies will need to revise their policies. The cyber insurance markets are beginning to adapt to the new California Consumer Privacy Act (CCPA) which went into effect on January 1. ...more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
In a gripping tale sure to excite die-hard Potter fans everywhere, the English High Court has granted a so-called ‘Harry Potter injunction‘ (i.e. a protective injunction against persons unknown) restraining the dissipation of...more
Artificial Intelligence (“AI”) Is A Complicated Technology Developed With Data. This Saddles AI It With A Host Of Potential Privacy Regulations, Including Europe’s Data Protection Law, The General Data Protection Regulation...more
We have definitely seen an uptick in the number of ransomware attacks against municipalities around the country. Thus far, the attacks have been against single cities, towns, and court systems, and recently against a...more
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
A new Sixth Circuit decision may signal an emerging trend on whether insurers must cover claims made by policyholders who fall victim to phishing scams....more