Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

After a Hurricane: Can the Property Manager Be Blamed for a Lessee's Losses? Image

After a Hurricane: Can the Property Manager Be Blamed for a Lessee's Losses?

Janice G. Inman

The recent decision in <i>Sears Roebuck & Co. and Kmart Corp. v. W/S Lebanon LLC</i> seems timely in light of the fact that commercial landlords, tenants and their insurance providers are grappling with the problems caused by the extreme wind and rain of hurricanes. Here's what happened in that case.

Features

DRaaS: How It Takes a Law Firm's DR Beyond Insurance Image

DRaaS: How It Takes a Law Firm's DR Beyond Insurance

Jeff Ton

With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.

Features

Managing Cyber Risks in Medical Practices Image

Managing Cyber Risks in Medical Practices

Kevin Quinley

<b><I>Part Two of a Two-Part Article</I></b><p>Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.

Features

Home Insurance May Cover Jealous Husband's Attack on Third Party Image

Home Insurance May Cover Jealous Husband's Attack on Third Party

Janice G. Inman

A man returns home unexpectedly, finds his wife with another man, and shoots him. It's an unfortunate chain of events, but certainly not unheard of. What <I>is</I> unusual is how the case of a love triangle like this one could lead to an Eleventh Circuit decision about homeowners' insurance.

Features

Preet Bharara Highlighted Insurance Fraud Image

Preet Bharara Highlighted Insurance Fraud

Evan H. Krinick

Over nearly eight years as U.S. Attorney for the Southern District of New York, Preet Bharara became recognized as a powerful prosecutor in many areas, including government corruption and white-collar crime. Another subject for which he certainly deserves mention is his strong record helping to fight insurance fraud in New York.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.

Features

Creditor Exclusion<br><b><i><font="-1">The Perils of D&O Coverage</b></i></font> Image

Creditor Exclusion<br><b><i><font="-1">The Perils of D&O Coverage</b></i></font>

Shmuel Vasser & Yehuda Goor

The U.S. Court of Appeals for the Fifth Circuit recently held that a Creditor Exclusion provision in D&O insurance policies may result in significant limitations on the coverage provided to the D&Os when the underlying dispute is with a creditor acting in its creditor capacity.

Features

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font> Image

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>

Sean B. Cooney

High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Cyberinsurance Considerations for Law Firms Image

Cyberinsurance Considerations for Law Firms

Elizabeth Vandesteeg & Kathryn Nadro

Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.

Features

The Bermuda Form Image

The Bermuda Form

Jared Zola & Lisa M. Campisi

<b><i>Declaring an Integrated Occurrence (or Not)</b></i><p>Many Fortune 500 companies' product liability insurance programs use the Bermuda Form to insure alleged bodily injury and property damage. The Bermuda Form has many characteristics distinct from standard commercial general liability (CGL) policies. Knowing its intricacies is essential for any coverage lawyer involved in large-scale coverage analysis and disputes.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Broker Lien Laws
    Today, 34 jurisdictions have some form of statute that specifies whether, how, and for what a broker may file a lien for the non-payment of a commission in connection with the sale or lease of commercial real estate. A few states simply give brokers the right to file liens under mechanics' lien statutes, but more than 30 have enacted broker-specific lien laws.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›