Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

After a Hurricane: Can the Property Manager Be Blamed for a Lessee's Losses? Image

After a Hurricane: Can the Property Manager Be Blamed for a Lessee's Losses?

Janice G. Inman

The recent decision in <i>Sears Roebuck & Co. and Kmart Corp. v. W/S Lebanon LLC</i> seems timely in light of the fact that commercial landlords, tenants and their insurance providers are grappling with the problems caused by the extreme wind and rain of hurricanes. Here's what happened in that case.

Features

DRaaS: How It Takes a Law Firm's DR Beyond Insurance Image

DRaaS: How It Takes a Law Firm's DR Beyond Insurance

Jeff Ton

With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.

Features

Managing Cyber Risks in Medical Practices Image

Managing Cyber Risks in Medical Practices

Kevin Quinley

<b><I>Part Two of a Two-Part Article</I></b><p>Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.

Features

Home Insurance May Cover Jealous Husband's Attack on Third Party Image

Home Insurance May Cover Jealous Husband's Attack on Third Party

Janice G. Inman

A man returns home unexpectedly, finds his wife with another man, and shoots him. It's an unfortunate chain of events, but certainly not unheard of. What <I>is</I> unusual is how the case of a love triangle like this one could lead to an Eleventh Circuit decision about homeowners' insurance.

Features

Preet Bharara Highlighted Insurance Fraud Image

Preet Bharara Highlighted Insurance Fraud

Evan H. Krinick

Over nearly eight years as U.S. Attorney for the Southern District of New York, Preet Bharara became recognized as a powerful prosecutor in many areas, including government corruption and white-collar crime. Another subject for which he certainly deserves mention is his strong record helping to fight insurance fraud in New York.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.

Features

Creditor Exclusion<br><b><i><font="-1">The Perils of D&O Coverage</b></i></font> Image

Creditor Exclusion<br><b><i><font="-1">The Perils of D&O Coverage</b></i></font>

Shmuel Vasser & Yehuda Goor

The U.S. Court of Appeals for the Fifth Circuit recently held that a Creditor Exclusion provision in D&O insurance policies may result in significant limitations on the coverage provided to the D&Os when the underlying dispute is with a creditor acting in its creditor capacity.

Features

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font> Image

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>

Sean B. Cooney

High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Cyberinsurance Considerations for Law Firms Image

Cyberinsurance Considerations for Law Firms

Elizabeth Vandesteeg & Kathryn Nadro

Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.

Features

The Bermuda Form Image

The Bermuda Form

Jared Zola & Lisa M. Campisi

<b><i>Declaring an Integrated Occurrence (or Not)</b></i><p>Many Fortune 500 companies' product liability insurance programs use the Bermuda Form to insure alleged bodily injury and property damage. The Bermuda Form has many characteristics distinct from standard commercial general liability (CGL) policies. Knowing its intricacies is essential for any coverage lawyer involved in large-scale coverage analysis and disputes.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›