Features

After a Hurricane: Can the Property Manager Be Blamed for a Lessee's Losses?
The recent decision in <i>Sears Roebuck & Co. and Kmart Corp. v. W/S Lebanon LLC</i> seems timely in light of the fact that commercial landlords, tenants and their insurance providers are grappling with the problems caused by the extreme wind and rain of hurricanes. Here's what happened in that case.
Features

DRaaS: How It Takes a Law Firm's DR Beyond Insurance
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
Features

Managing Cyber Risks in Medical Practices
<b><I>Part Two of a Two-Part Article</I></b><p>Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.
Features

Home Insurance May Cover Jealous Husband's Attack on Third Party
A man returns home unexpectedly, finds his wife with another man, and shoots him. It's an unfortunate chain of events, but certainly not unheard of. What <I>is</I> unusual is how the case of a love triangle like this one could lead to an Eleventh Circuit decision about homeowners' insurance.
Features

Preet Bharara Highlighted Insurance Fraud
Over nearly eight years as U.S. Attorney for the Southern District of New York, Preet Bharara became recognized as a powerful prosecutor in many areas, including government corruption and white-collar crime. Another subject for which he certainly deserves mention is his strong record helping to fight insurance fraud in New York.
Features

Untangling the Mystery of Cybersecurity Insurance
IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.
Features

Creditor Exclusion<br><b><i><font="-1">The Perils of D&O Coverage</b></i></font>
The U.S. Court of Appeals for the Fifth Circuit recently held that a Creditor Exclusion provision in D&O insurance policies may result in significant limitations on the coverage provided to the D&Os when the underlying dispute is with a creditor acting in its creditor capacity.
Features

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>
High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
Features

Cyberinsurance Considerations for Law Firms
Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.
Features

The Bermuda Form
<b><i>Declaring an Integrated Occurrence (or Not)</b></i><p>Many Fortune 500 companies' product liability insurance programs use the Bermuda Form to insure alleged bodily injury and property damage. The Bermuda Form has many characteristics distinct from standard commercial general liability (CGL) policies. Knowing its intricacies is essential for any coverage lawyer involved in large-scale coverage analysis and disputes.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Undercutting the Cost of Underperforming Attorneys Is Your ResponsibilityAs a firm leader it is your fiscal responsibility to address underperforming attorneys. With COVID-19, are your underperformers flying under the radar? The cost to a firm is not only to the bottom line, but to your reputation as a leader.Read More ›
- Broker Lien LawsToday, 34 jurisdictions have some form of statute that specifies whether, how, and for what a broker may file a lien for the non-payment of a commission in connection with the sale or lease of commercial real estate. A few states simply give brokers the right to file liens under mechanics' lien statutes, but more than 30 have enacted broker-specific lien laws.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›