Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
The Standard Formula Podcast | Dissecting the Solvency Capital Requirement
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
The Standard Formula Podcast | Solvency II Back to Basics: Technical Provisions
D&O Insurance Myths (Part 2)
Hinshaw Insurance Law TV | Bad Faith Law
The Standard Formula Podcast | Investment Rules for Insurers and Reinsurers
D&O Insurance Myths (Part 1)
The Standard Formula Podcast | Understanding the UK’s Matching Adjustment Regime
The Standard Formula Podcast | Solvency II Back to Basics: Third Country Branches and Cross-Border Provision of Services
Standard Formula Podcast | Reinsurance and Risk Transfer: Risk Mitigation Under the Solvency II Regime
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
The Risk Roundtable: Demystifying the Intersection Between NJ Workers' Comp & Employment Practice Liability
GILTI Conscience Podcast | Tax Insurance 101
Insurance for the Cannabis Industry: Risks & Challenges
The Standard Formula Podcast | International Association of Insurance Supervisors: Who They Are and Their Industry Impact
Welcome to our seventh 2024 issue of Decoded - our technology law insights e-newsletter. We have a few events we want to pass along to those interested in technology, but also other areas of law and business. ...more
Editor's Note: The convergence of CYE's and Surfshark's analyses reveals a critical juncture in the fight against cyber threats. With the U.S. leading global data breaches and businesses facing significant insurance coverage...more
Your company was hacked. You feel panic, embarrassment, anger, fear and confusion. But you must act quickly, logically and decisively to stop the bleeding and protect your business, your customers and your employees. The good...more
Over the last few years, the work of the Cybersecurity (H) Working Group of the National Association of Insurance Commissioners (“NAIC”) has focused on cybersecurity risk to insurance licensees such as insurance carriers,...more
By definition, insurance policies represent an exercise in planning for (and hedging against) catastrophe. Cyber insurance for the healthcare industry is no exception. But any hedge is only as good as it’s reliable. Many...more
Followers of the cyber insurance market over the past two years may be suffering from whiplash—that’s how dramatically the market shifted from 2022 to 2023. A perfect storm of good trends and facts combined to create a soft...more
As 2024 rapidly approaches, we look back at some of the key decisions, trends, and developments impacting the U.S. insurance industry in 2023 and look ahead at some trends and cases to watch in 2024. Insurers continue to...more
On this episode of Don't Take No for An Answer, host, Lynda A. Bennett, Partner and Chair of Lowenstein’s Insurance Recovery Group, is joined by David Anderson, Vice President, Cyber Liability at Woodruff Sawyer, and Heather...more
The National Association of Insurance Commissioners (NAIC) has issued a model bulletin exposure draft on the use of algorithms, predictive models and artificial intelligence (AI) systems by insurers. In short, users of...more
Cyber insurance is more important than ever, says Eric Jesse, who provides three tips for deriving the most value possible from your cyber insurance policy. Eric advises policyholders to clearly understand the scope of their...more
As previously reported, on November 3, 2022, the federal district court for Minnesota, applying Minnesota substantive law, ruled that an insured was entitled to coverage under a Cyber Business Interruption clause for money...more
Medibank, one of Australia’s largest private health insurers, detected a ransomware attack in October 2022. The attackers, believed to be part of a criminal organization based in Russia, exfiltrated approximately 9.7 million...more
When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford...more
Cyber liability insurance coverage is not a one-size-fits-all blanket policy that can be applied to all types of businesses. Every organization has choices as to what types of cyber liability coverage it needs to protect...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...more
Healthcare breaches, including ransomware attacks, continue to increase. As a result, many healthcare organizations seeking cyber coverage to help defray the costs associated with a ransomware attack or other data incident...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
On March 22, 2022, the United States District Court for the District of Minnesota ruled that two ACE insurers were obligated to indemnify Target Corporation (“Target”) for the amounts it paid to settle claims related to...more
In this episode, partners Jeff Meagher and Lucas Tanglen, along with associate Reymond Yammine, discuss the Russia-Ukraine conflict and insurance for state-sponsored cyberattacks, including lessons learned from the NotPetya...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more
Cyber Security And Privacy Insurance Claims - This is the fifth installment of our series of articles reviewing some of the key trends and developments currently impacting the U.S. insurance industry. To date, the vast...more
The past 20 months have created a lot of transitions in how people work. Some companies still have the majority of their employees working remotely and intend to keep it that way permanently. Other businesses have tried to...more
We are still in the relatively early stages of jurisprudence addressing the insurability of loss stemming from data breaches. Compared to the more developed body of case law interpreting coverage provisions and exclusions...more