Features
DRaaS: How It Takes a Law Firm's DR Beyond Insurance
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
Features
Managing Cyber Risks in Medical Practices
<b><I>Part Two of a Two-Part Article</I></b><p>Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.
Features
Home Insurance May Cover Jealous Husband's Attack on Third Party
A man returns home unexpectedly, finds his wife with another man, and shoots him. It's an unfortunate chain of events, but certainly not unheard of. What <I>is</I> unusual is how the case of a love triangle like this one could lead to an Eleventh Circuit decision about homeowners' insurance.
Features
Preet Bharara Highlighted Insurance Fraud
Over nearly eight years as U.S. Attorney for the Southern District of New York, Preet Bharara became recognized as a powerful prosecutor in many areas, including government corruption and white-collar crime. Another subject for which he certainly deserves mention is his strong record helping to fight insurance fraud in New York.
Features
Untangling the Mystery of Cybersecurity Insurance
IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.
Features
Creditor Exclusion<br><b><i><font="-1">The Perils of D&O Coverage</b></i></font>
The U.S. Court of Appeals for the Fifth Circuit recently held that a Creditor Exclusion provision in D&O insurance policies may result in significant limitations on the coverage provided to the D&Os when the underlying dispute is with a creditor acting in its creditor capacity.
Features
Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>
High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
Features
Cyberinsurance Considerations for Law Firms
Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.
Features
The Bermuda Form
<b><i>Declaring an Integrated Occurrence (or Not)</b></i><p>Many Fortune 500 companies' product liability insurance programs use the Bermuda Form to insure alleged bodily injury and property damage. The Bermuda Form has many characteristics distinct from standard commercial general liability (CGL) policies. Knowing its intricacies is essential for any coverage lawyer involved in large-scale coverage analysis and disputes.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›