Tag Archives: Cyber Risk

Losses in Cyber-Space: Recovering Insurance Proceeds When Your Computer Data Can’t Be Recovered (Part One)

This is the first post in a three-part series about first-party coverage for losses of computer data. Labor Day 2016 was a bad day for my client. That was the day her web host company hit the delete button, knocking her offline and completely wiping out her business website. Instead of celebrating a holiday weekend, … Continue Reading

New Cybersecurity Regulations Series (Part Two)

Part two of this series continues exploring cybersecurity regulations and breach notification requirements. [Read Part One here]. The first installment of this post mentioned some of the cyber security regulations in New York, which has been noted as leading the pack in this area.1 Part two follows up with a few additional regulations and calls to … Continue Reading

Appellate Court Reverses Lower Court’s Dismissal of Plaintiffs Data-Breach Claim

In a win for third-party victims of a cyber security attack, the United States Court of Appeals, District of Columbia reversed a lower court’s decision dismissing a class-action suit against their health insurer for breach of contract, negligence, and violation of various state consumer-protection statutes, after their personal information was stolen during a data breach.1… Continue Reading

New York Restaurant’s Data Breach Not Covered Under Their Business Owners Policy

Restaurants are prime targets for hackers. Restaurants gather customer credit card information on a daily basis and are responsible for storing and protecting that information. All restaurant owners should have insurance policies that not only cover their physical property damage and business interruption in case of property damage, but data breaches as well. Data breaches, … Continue Reading

I’ve Been Hacked! Am I Covered?

In the wake of the Equifax, Target, Yahoo, and even the SEC being hacked, many small businesses are wondering how can they protect themselves when major companies with much larger budgets and cybersecurity techs on staff can’t protect themselves. I recently went to a course where one of the speakers said: “There are two types … Continue Reading
LexBlog