Insurance Coverage Issues Implicated in Data Breach Claims

Size: px
Start display at page:

Download "Insurance Coverage Issues Implicated in Data Breach Claims"

Transcription

1 Insurance Coverage Issues Implicated in Data Breach Claims Alex E. Potente Sedgwick LLP San Francisco, CA (415) James H. Kallianis, Jr. Meckler Bulger Tilson Marick & Pearson LLP Chicago, IL (312) Kimberly Jackanich Sedgwick LLP San Francisco, CA (415)

2 Alex E. Potente is a trial lawyer who represents insurers and reinsurers in complex commercial insurance litigation matters. His coverage-litigation practice focuses on disputes pertaining to general liability, D&O, and professional liability policies, specifically extra-contractual coverage for claims arising from long-tail environmental, personal and advertising injury, and product-defect litigation. He is currently representing a national insurer in its cyber-liability and privacy-related business tort matters. Over the past twenty years, James H. Kallianis, Jr. has represented corporations and individuals in matters ranging from employment disputes to multimillion dollar securities and consumer fraud class actions. Jim also has represented insurers in matters involving directors and officers, cyber, general liability, employment practices and professional liability policies. Jim has tried cases in state and federal courts around the country and has argued appeals before state and federal appellate courts. He also frequently speaks and writes on developing areas of law, including director and officer liability, cyber liability and managed care liability. Jim has been selected as a Super Lawyer and a Leading Lawyer in Illinois. Jim is Chair of the Directors & Officers Subcommittee for DRI s Insurance Committee. Kimberly Jackanich handles complex insurance coverage disputes and litigation matters on behalf of insurer clients concerning professional liability, directors and officers liability, employment practices liability, errors and omissions coverage, and commercial general liability policies. Kimberly also focuses her practice on product liability and toxic tort litigation, including the defense of claims involving energy companies, automobile manufacturers, and construction companies. She participates in all aspects of litigation, including case analysis and strategy, discovery and depositions, motion practice and trial preparation.

3 Insurance Coverage Issues Implicated in Data Breach Claims Table of Contents I. Coverage Issues Presented by CGL Policies A. CGL Policies: Coverage Part A B. CGL Policies: Coverage Part B What Constitutes a Publication Issues Related to Intentional Conduct, Knowing Violation, and Expected or Intended Injury Policy Provisions C. CGL Policy Changes II. Cyber Risk Policies III. Defense and Other Practical Considerations for Insurers Insurance Coverage Issues Implicated in Data Breach Claims Potente et al. 403

4

5 Insurance Coverage Issues Implicated in Data Breach Claims Nearly every day customers receive s notifying them of the need to change their passwords and monitor their accounts due to a recent compromise of a company s data. When hackers and customers financial data are not in the news, the stories are filled with government leaks and sensitive secrets being blast across the internet and around the globe. Mentions of Target, Heartbleed, Wikileaks, Edward Snowden, and PlayStation immediately bring to mind compromises of data and the abundance of monitoring and prevention costs that come along with those compromises. These incidents have profound criminal, financial and reputational implications. According to recent reports, the average cost of a data breach incident is estimated at $5.4 million dollars. Target s data breach alone resulted in shareholder derivative litigation and roughly 70 class action lawsuits. Cyber risks permeate daily business for many companies and most consumers. Tracking software, hackers, malware, viruses, wiretapping, eavesdropping, robocalls, and solicitation can lead to identity theft and compromised financial, personal, and health information. Potential targets for unauthorized access of information include retail merchandisers, hospital/medical facilities, law firms, accounting firms and financial institutions, educational institutions, government, the energy sector and manufacturers. As the number of these incidents grows, so does the number of affected individuals pursuing legal action to remedy their injuries. Affected individuals pursue a variety of different legal theories, including (1) common law privacy, tort, and contract claims; (2) constitutional privacy claims; (3) state and federal statutory claims; and (4) and failure to notify claims under state data breach notification statutes. Importantly, even when there is no evidence that the compromised data has been used or otherwise disseminated, companies still are potentially subject to notification requirements, resulting in significant costs, including those set forth by HIPAA, the Gramm-Leach Bliley Act, and the Federal Information Security Management Act. Currently, 46 states have notification statutes, generally requiring at a minimum prompt notice to those affected and to the State Attorney General. Moreover, many of these statutes impose substantial daily fines for late notice or confer a private-right of action for failure to comply. So called, acquisition-based triggered data breach notification statutes do not even require an unauthorized person to have acquired the breached data. For example, California requires notification after any data breach merely if the data was, or is reasonably believed to have been, acquired by an unauthorized person. Disclosure under these statutes must be made in the most expedient time possible and without unreasonable delay. At least 16 states have acquisition trigger statutes, including California, Delaware, Florida, Georgia, Hawaii, Illinois, Indiana, Maine, Minnesota, Nevada, New York, North Dakota, Oklahoma, Rhode Island, Tennessee, and Texas. The alternative risk-based data-breach notification trigger requires assessing whether a danger exists to those whose records were breached, which equally can result in significant costs to a company. For example, the Ohio model of the risk-based trigger requires notification when the breached company has both a reasonable belief that information was acquired and the acquisition of such information will cause a material risk of identity theft or other fraud. Another example New Jersey s Identity Theft Prevention Act does not require notification when the business or public entity establishes that misuse of the information is not reasonably possible. These notification statutes raise issues of who will perform the requisite risk assessments and notifications and, more importantly, who will pay for the costs associated with the assessment and notification. States with risk-based triggers include: Arkansas, Arizona, Colorado, Connecticut, Idaho, Kansas, Louisiana, Montana, Nebraska, New Hampshire, New Jersey, North Carolina, Pennsylvania, Utah, Washington and Wisconsin. Insurance Coverage Issues Implicated in Data Breach Claims Potente et al. 405

6 Not surprisingly, the frequency and costs of data breaches inexorably lead to thorny questions of insurance coverage under general liability (CGL) policies, particularly when an insured either has not purchased any or has not purchased enough cyber-specific insurance to cover the potentially significant costs associated with a breach. Faced with lawsuits and the sometimes sizeable costs incurred in connection with a breach, insureds have attempted to secure coverage under CGL policies and, more recently, under specially-tailored, cyber-risk policies to help cover those costs. This paper addresses some of the issues confronted when an insured attempts to secure coverage under a CGL policy for the costs associated with a data breach and discusses the availability of specific cyber-related insurance products, as well as issues that the involved parties, particularly insurers, must consider when considering insurance coverage for the costs related to a data breach. I. Coverage Issues Presented by CGL Policies The CGL policy, a traditional insurance policy, was originally designed to protect businesses against liability for claims of bodily injury, property damage, and personal and advertising injury. The standard Coverage A Bodily Injury and Property Damage Liability part provides typically provides coverage for those sums that the insured becomes legally obligated to pay as damages because of bodily injury or property damage to which this insurance applies. The standard Coverage B Personal and Advertising Liability Injury typically provides coverage for those sums that the insured becomes legally obligated to pay as damages because of personal and advertising injury to which this insurance applies. The question of coverage for the costs associated with a data breach under these policies ultimately turns on how property damage and/or personal and advertising injury are defined by the insurance policy at issue and, possibly, how a court interprets those terms in a coverage dispute. A. CGL Policies: Coverage Part A Most CGL policies define property damage to require physical damage to tangible property, and specifically exclude coverage for any information, data or facts stored in an electronic format from the definition of tangible property. Damage or loss of electronic data does not fall within the definition of tangible property under Coverage A unless physical damage to or loss of use of a tangible object, such as loss of use of a computer, occurred. See Eyeblaster, Inc. v. Federal Insurance Co., 613 F.3d 797 (8th Cir. 2010) (finding that property damage occurred because underlying plaintiff had alleged loss of use of his computer). Many CGL policies also contain an electronic data exclusion that precludes coverage for lost data. An electronic data exclusion typically provides as follows: Damages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data. As used in this exclusion, electronic data means information, facts or programs stored as or on, created or used on, or transmitted to or from computer software, including systems and applications software, hard or floppy disks, CD-ROMS, tapes, drives, cells data processing devices or any other media which are used with electronically controlled equipment. Because Coverage A policy definitions and electronic data exclusions make coverage under side-a of a CGL policy less tenable, insureds often turn to Coverage B or specially tailored cyber-risk policies to secure coverage for their cyber risk incidents. B. CGL Policies: Coverage Part B Cyber risk coverage under Coverage B typically turns on the definition of personal and advertising injury. The current ISO (Insurance Services Office, Inc.) form Coverage B language provides coverage for 406 Data Breach and Privacy Law September 2014

7 personal and advertising injury defined to include oral or written publication, in any manner, of material that violates a person s right of privacy. In the context of a cyber breach, the pertinent coverage question often is whether theft of private identifying information constitutes publication. Recently, a New York trial court held that a data breach, committed by a third party, does not satisfy the publication requirement under Coverage B. In Zurich American Insurance Co. v. Sony Corp. of America, hackers stole personally identifiable information of PlayStation users after they bypassed the security protecting this information. Faced with users suits, Sony turned to its CGL insurer for coverage asserting that the hackers unauthorized access to the personal information had constituted a publication that had violated its users right of privacy. In 2014, in a major victory for insurers, a New York trial court judge found that the policy could only be triggered by the actions of Sony itself, not by the actions of third parties who hacked its network. But as the future appeal of the Sony action illustrates, the scope of coverage under Coverage B for cyber incidents is still very much in dispute. When presented with a request for coverage for the costs related to a cyber breach, Insurers are likely to raise a variety of coverage defenses including the following: (1) the lack of a publication in many cyber incidents; (2) the lack of a claim for a violation of privacy; (3) the insured or third party s knowing/intentional violations of the law and corresponding policy exclusions; (4) the insured s expected or intended injury and corresponding policy exclusions; (5) the insured or third party s criminal activity and corresponding policy exclusions; (6) the insured s liability for fines, penalties or other non-monetary relief that does not fall within the policy s definition of covered Loss; and (7) online activity or intellectual property exclusions. Two significant issues that often determine whether coverage exists for a data breach related claim or the costs associated with a breach include the issue of publication as required by most CGL policies and the exclusion or exclusions found in CGL policies related to intentional or knowing conduct. 1. What Constitutes a Publication When a breach occurs and information has been compromised, but there is no proof of anyone s use of the compromised information, the question in the insurance coverage context becomes whether there has been a publication of the information such that there can be a legitimate claim for violation of privacy. The issue in dispute in these scenarios usually becomes what constitutes a publication and raises a variety of questions, including: How many people must see the information in order to constitute a publication of that information? Do the individuals seeing the information have to be third parties or can unauthorized access or intra-company communications constitute a publication? Does publication require an affirmative act by the insured or can negligent displacement or failure to secure information lead to a publication? Courts across the country have found no publication in a variety of data breach incidents. For example, in Butts v. Royal Vendors, Inc., 202 W.Va. 448 (1998), the West Virginia Supreme Court found no coverage for publication of material that violates another person s right or privacy. In Butts, the insured allegedly induced a physician to breach his fiduciary duty to a patient a temporarily disabled employee whom the insured believed to be malingering by disclosing the patient s private health information. Similarly, in Recall Total Info Management v. Federal Ins. Co., 2012 WL (Conn. Super. Jan. 17, 2012), a Connecticut court found that theft of computer tapes was not a publication of material that violates a person s right of privacy. The Recall Total court found no potential for coverage because there was no evidence that the information on the tapes was ever communicated to a third person. Likewise, in Duff Supply Co. v. Crum & Forster Inc. Co., 1997 WL (E.D.Pa. 1997), the Eastern District of Pennsylvania held that monitoring of telephone calls did not trigger a potential for coverage for a privacy claim because there were no allegations that the insured disclosed any information it learned by monitoring the calls. Insurance Coverage Issues Implicated in Data Breach Claims Potente et al. 407

8 The Restatement of Torts addresses the issue of publication in the context of defamation and could be considered analogous to publication in the cyber risk context. According to the Restatement, accidental communication to a third person of defamatory matter is not a publication if there is no negligence. An act not intended to be communicated to a third person, and which does not create an unreasonable risk of communication, is not published. For example, a publication for the purposes of libel does not occur in the following scenario: A writes a letter to B containing defamatory statements about C. He puts the letter in his desk and locks it up. A thief breaks open the desk and reads the letter. Under this example, there would be no publication or making known of material when the compromise of data results from unauthorized access or theft of electronic data by a third party. Thus, the instances of hacking and other unauthorized intrusions by third parties would not be covered under the oral or written publication portion of personal and advertising injury. A publication could occur, however, if the insured was negligent in securing the information, creating an unreasonable risk that the material would be stolen. This is consistent with California law, which holds that a publication of defamatory or disparaging material may give rise to liability if it is either intentional or negligent. See Haley v. Casa Del Rey Homeowners Ass n, 153 Cal.App.4th 863, (2007). Similarly, an exclusion known as the prior publication exclusion may preclude or limit coverage for cyber risks. Under this exclusion, content first published before the policy period is not covered. When hacking or unauthorized access occurs over a period of time, and the first access to the data occurred before the policy period, all future access of that same data is not covered. The issue then becomes what constitutes first access or publication of this data: does the hacker have to affirmatively use the information, or is unauthorized access alone sufficient? When insureds are subject to hacking or unauthorized access over an extended period of time, and wait to file a claim until discovery of the access, arguably any access that occurred before the policy period could constitute a prior publication. In such a case, all damage asserted from that same unauthorized access during the policy period should be precluded by the prior publication exclusion. 2. Issues Related to Intentional Conduct, Knowing Violation, and Expected or Intended Injury Policy Provisions Based on policy language, statutes, and public policy restrictions, insurers may be shielded from providing coverage in instances where the damage is caused by the insured s intentional conduct, knowing violation of the law, criminal conduct, or other expected and intended injury. With regard to intentional or knowing violations of the law, CGL policies provide that their insurance does not apply to personal and advertising injury caused by or at the direction of the insured with the knowledge that the act would violate the rights of another and would inflict personal and advertising injury. Similarly, CGL policies also contain an exclusion for criminal acts, which provide that the insurance does not apply to personal and advertising injury arising out of a criminal act committed by or at the direction of the insured. Further, in addition to policy language, many states have provisions (or a body of case law) like California Insurance Code Section 533, which provides that an insurer will not be liable for the willful act of its insured. When the unauthorized access, disclosure or criminal activity is undertaken by the insured or by an agent or employee of the insured, these exclusions call into question the availability of coverage. CGL policies also typically preclude coverage for expected or intended injury, providing that the carriers will not be liable for injury expected or intended from the standpoint of the insured. Where unauthorized access to sensitive data occurs over a period of time, the question becomes when the insured first had knowledge that its systems were compromised. When companies are aware of the threats and choose to utilize inadequate security and monitoring methods for its data, the question arises when should the insured have been aware that unauthorized access to its data was occurring. The application of these exclusions should be clear in situations where insureds fail to take security measures or fail to monitor their systems such that 408 Data Breach and Privacy Law September 2014

9 hackers gain unfettered access to their data. Of course, many of these situations involve a series of breaches where the insured only learns of the unauthorized access after a certain amount of data is compromised. Arguably, an insurer should only be held liable, if at all, for the first unauthorized access because an insured was then sufficiently on notice of the injury such that any future injury caused by the insured s failure to take preventative action was expected or intended by the insured. In addition, the standard of when an insured should be aware of unauthorized access such that the insured s inaction in preventing further unauthorized access constitutes an expected or intended injury may vary from industry to industry. C. CGL Policy Changes Presently, insurance companies are adding new definitions and exclusions to their policy forms to reinforce the proposition that the policies do not afford coverage for massive data breaches. Some commercial general liability policies now include the 2014 ISO form entitled Access or Disclosure of Confidential or Personal Information Exclusion. This exclusion, which expressly limits Coverage B personal and advertising injury in data breach situations, provides as follows: Access Or Disclosure Of Confidential Or Personal Information Personal and advertising injury arising out of any access to or disclosure of any person s or organization s confidential or personal information, including patents, trade secrets, processing methods, customer lists, financial information, credit card information, health information or any other type of nonpublic information. This exclusion applies even if damages are claimed for notification costs, credit monitoring expenses, forensic expenses, public relations expenses or any other loss, cost or expense incurred by you or others arising out of any access to or disclosure of any person s or organization s confidential or personal information. Similarly, insurers also are adding an exclusion for Coverage A Bodily Injury and Property Damage insurance, which provides that the insurance does not apply to access to or disclosure of information or the loss of, loss use of, damage to, corruption of, inability to access, or inability to manipulate electronic data. Along with the addition of these exclusions, the definition of Personal and Advertising Injury itself is evolving. As part of its April 2013 revisions to the CGL policy forms, Insurance Services Office Inc. introduced an endorsement entitled Amendment Of Personal And Advertising Injury Definition, which eliminates the linchpin argument oral or written publication in any manner, of material that violates a person s right of privacy from application to Coverage B. Specifically, the endorsement states: With respect to Coverage B Personal and Advertising Injury Liability, Paragraph 14.e. of the Definitions section does not apply. As the policies evolve to limit or otherwise preclude coverage for cyber related incidents, it remains unclear whether insureds will continue to seek coverage under traditional CGL policies or turn to the newlyemerging cyber risk policies. II. Cyber Risk Policies With CGL insurers changing the terms of their policies to respond to cyber risks, specially-tailored cyber policies are becoming an attractive option to companies wanting to protect themselves from the uncertainty of insurance coverage. Cyber risk policies are a relatively new product, introduced by insurers in the early 2000s. Designed to fill in the gaps of traditional first and third party insurance policies, cyber risk policies typically offer both first and third party coverage. First-party coverage may include the following: (1) Insurance Coverage Issues Implicated in Data Breach Claims Potente et al. 409

10 electronic theft and fraud coverage; (2) business interruption and extra expense; (3) computer and data loss restoration; (4) forensic investigation; (5) public relations expenses; and (6) notification costs and credit monitoring. Third party coverage may include (1) privacy liability, (2) network security liability; (3) internet media liability; and (4) employee privacy liability. The language for cyber risk policies varies from carrier to carrier, and there is no standard cyber risk form. The variance in policy language offers insureds the ability to choose language that is most favorable to their potential risks and desired coverage. However, the variation in language also allows for variation in interpreting the scope of such coverage. Given the relatively new existence of these policies, the scope of coverage and potential coverage defenses remains to be determined. Nevertheless, potential coverage issues for cyber risk policies include claims-made and reporting issues, multiple insurers and/or issues of other insurance, policy exclusions, definition of loss, coverage for regulatory investigations, and control of the defense. A purchaser of cyber risk insurance should consider whether the policy it is considering covers not just its own errors and omissions, but the errors and omissions of its vendors. Similarly, if the insured is a vendor, it will want to consider whether any cyber risk policy it considers affords coverage for claims related to customer data and not just the vendor s own data. As the cyber risk policies solidify their language and the popularity of cyber risk policies grows, these and other coverage issues will come to light and shape what may be the future of insurance coverage for cyber related incidents. III. Defense and Other Practical Considerations for Insurers With all of the coverage defenses potentially applicable to cyber incidents and the scope of cyber risk policies to be determined, insurers must carefully consider the appropriate reservation of rights to assert before assuming the defense of a cyber-related incident. An important issue for insurers providing a defense becomes whether they are entitled to reimbursement of a settlement payment if a court later determines that there is no coverage. In Blue Ridge Ins. Co. v. Jacobsen, 25 Cal.4th 489 (2001), the California Supreme court endorsed the view that an insurer should settle claims within policy limits even when the liability is not covered. The insurer in Blue Ridge was faced with a policy limits demand from the plaintiff, which it viewed as reasonable in light of the liability of the insured and probable damages that would be awarded, but that the insurer believed would not be covered. The insureds refused to contribute or to assume their defense. The insurer therefore unilaterally reserved its rights, settled and then sued for reimbursement. In the appeal of a subsequent coverage action, the California Supreme Court held that under these circumstances, an insurer may unilaterally reserve its rights to reimbursement when it settles a claim over the insured s objections. Thus, when the liability for these cyber risk incidents is significant and insurance coverage appears questionable, insurers may still want to consider contributing to a settlement under reservation of rights and then, if possible, seeking reimbursement to avoid the potentially larger costs that could result from the class action suits. Critically, an insurer should consider the law from the relevant jurisdictions when deciding how best to proceed under such circumstances. Further, as the impact of many cyber incidents can be widespread and lead to large class action lawsuits, insurers are faced with significant defense costs that quickly approach the policy limits of liability. Insurers are then faced with practical and strategic decisions regarding the intersection of costs and defense. The expense of matters such as motions for class certification, class notice, class administration, and attorney fees for prevailing parties can reach into the millions in potential exposure for insureds. If insureds are ultimately found responsible for these costs, they are likely to turn to their insurers for reimbursement. Thus, insurers must carefully consider these potential costs and evaluate whether these costs qualify as defense costs or sup- 410 Data Breach and Privacy Law September 2014

11 plementary payments under the terms of their respective policies. If these costs are considered damages or defense costs, they are likely to be deemed as falling within the indemnity limit, thus protecting the insurers from significant costs in excess of the policy limit of liability. However, if they are deemed supplementary payments, an insurer may be obligated to pay those amounts outside the indemnity limits of the policy. * * * It remains to be seen whether and how CGL policies will respond to the exposures caused by data breaches and what the impact the market for cyber risk policies will have in the context of data breaches. As the law develops and the market for cyber risk policies continues to expand, both CGL insurers and cyber risk insurers should carefully consider the potential consequences of their actions in handling data breach claims to avoid exposure to overwhelming and possibly unintended costs. Similarly, insureds would be best advised to evaluate their insurance program and consider how the policies currently in place potentially would respond to a data breach incident and whether the insured would be better protected by a separate cyber risk policy. Insurance Coverage Issues Implicated in Data Breach Claims Potente et al. 411

12

DATA BREACH CHARTS (Current as of December 31, 2015)

DATA BREACH CHARTS (Current as of December 31, 2015) DATA BREACH CHARTS (Current as of December 31, 2015) The charts below provide summary information about data breach notification statutes across the country. California adopted the first data breach notification

More information

January 2007. An Overview of U.S. Security Breach Statutes

January 2007. An Overview of U.S. Security Breach Statutes January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed

More information

Cyber and CGL Insurance Coverage for Data Breach Claims

Cyber and CGL Insurance Coverage for Data Breach Claims Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance

More information

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell

Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Who s Afraid Of A Big Bad Breach?: Updates on HITECH and State Breach Notification and Security Requirements Robin Campbell Overview Identifying the laws that protect personal information and protected

More information

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner

More information

High Risk Health Pools and Plans by State

High Risk Health Pools and Plans by State High Risk Health Pools and Plans by State State Program Contact Alabama Alabama Health 1-866-833-3375 Insurance Plan 1-334-263-8311 http://www.alseib.org/healthinsurance/ahip/ Alaska Alaska Comprehensive

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION NOTICE: THE POLICY FOR WHICH THIS APPLICATION IS MADE IS A CLAIMS MADE AND REPORTED POLICY SUBJECT TO

More information

Public School Teacher Experience Distribution. Public School Teacher Experience Distribution

Public School Teacher Experience Distribution. Public School Teacher Experience Distribution Public School Teacher Experience Distribution Lower Quartile Median Upper Quartile Mode Alabama Percent of Teachers FY Public School Teacher Experience Distribution Lower Quartile Median Upper Quartile

More information

Problem Issues in Commercial General Liability, 2nd Edition

Problem Issues in Commercial General Liability, 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/1413760/ Problem Issues in Commercial General Liability, 2nd Edition Description: The commercial general liability policy is the

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

An Ohio court authorized this notice. This is not a solicitation from a lawyer. You are not being sued.

An Ohio court authorized this notice. This is not a solicitation from a lawyer. You are not being sued. NOTICE OF CLASS ACTION, PROPOSED SETTLEMENT, FAIRNESS HEARING AND RIGHT TO APPEAR To all persons who purchased a single premium credit life and/or credit disability insurance policy from Protective Life

More information

Three-Year Moving Averages by States % Home Internet Access

Three-Year Moving Averages by States % Home Internet Access Three-Year Moving Averages by States % Home Internet Access Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

State-Specific Annuity Suitability Requirements

State-Specific Annuity Suitability Requirements Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware District of Columbia Effective 10/16/11: Producers holding a life line of authority on or before 10/16/11 who sell or wish to sell

More information

Impacts of Sequestration on the States

Impacts of Sequestration on the States Impacts of Sequestration on the States Alabama Alabama will lose about $230,000 in Justice Assistance Grants that support law STOP Violence Against Women Program: Alabama could lose up to $102,000 in funds

More information

Workers Compensation State Guidelines & Availability

Workers Compensation State Guidelines & Availability ALABAMA Alabama State Specific Release Form Control\Release Forms_pdf\Alabama 1-2 Weeks ALASKA ARIZONA Arizona State Specific Release Form Control\Release Forms_pdf\Arizona 7-8 Weeks by mail By Mail ARKANSAS

More information

Chex Systems, Inc. does not currently charge a fee to place, lift or remove a freeze; however, we reserve the right to apply the following fees:

Chex Systems, Inc. does not currently charge a fee to place, lift or remove a freeze; however, we reserve the right to apply the following fees: Chex Systems, Inc. does not currently charge a fee to place, lift or remove a freeze; however, we reserve the right to apply the following fees: Security Freeze Table AA, AP and AE Military addresses*

More information

Exhibit B. State-By-State Data Security Overview

Exhibit B. State-By-State Data Security Overview Exhibit B State-By-State Data Security Overview Michele A. Whitham Partner, Founding Co-Chair Security & Privacy Practice Group Foley Hoag LLP 155 Seaport Boulevard Boston, MA 02210 State Statute Citation

More information

IIAC GUIDANCE: UNITED STATES SNOWBIRD AND TEMPORARY RESIDENT EXEMPTIONS

IIAC GUIDANCE: UNITED STATES SNOWBIRD AND TEMPORARY RESIDENT EXEMPTIONS IIAC GUIDANCE: UNITED STATES SNOWBIRD AND TEMPORARY RESIDENT EXEMPTIONS August 2012 IIAC Guidance on United States Snowbird and Temporary Resident Exemptions August 2012 This guidance reviews the U.S.

More information

How To Pay Medical Only Claims On Workers Compensation Claims

How To Pay Medical Only Claims On Workers Compensation Claims Workers Compensation Small Medical-Only Claims: Should an employer pay them or turn them in to the insurance company? by Maureen Gallagher The most common question an insurance agent gets from employers

More information

Recording Telephone Calls with Parties in Different Jurisdictions

Recording Telephone Calls with Parties in Different Jurisdictions United States Telephone Recording Laws Legal Aspects of Recording Telephone Conversations: A Practical Guide The federal Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. Sec. 2510 et seq.,

More information

MAINE (Augusta) Maryland (Annapolis) MICHIGAN (Lansing) MINNESOTA (St. Paul) MISSISSIPPI (Jackson) MISSOURI (Jefferson City) MONTANA (Helena)

MAINE (Augusta) Maryland (Annapolis) MICHIGAN (Lansing) MINNESOTA (St. Paul) MISSISSIPPI (Jackson) MISSOURI (Jefferson City) MONTANA (Helena) HAWAII () IDAHO () Illinois () MAINE () Maryland () MASSACHUSETTS () NEBRASKA () NEVADA (Carson ) NEW HAMPSHIRE () OHIO () OKLAHOMA ( ) OREGON () TEXAS () UTAH ( ) VERMONT () ALABAMA () COLORADO () INDIANA

More information

NON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST

NON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST NON-RESIDENT INDEPENDENT, PUBLIC, AND COMPANY ADJUSTER LICENSING CHECKLIST ** Utilize this list to determine whether or not a non-resident applicant may waive the Oklahoma examination or become licensed

More information

Net-Temps Job Distribution Network

Net-Temps Job Distribution Network Net-Temps Job Distribution Network The Net-Temps Job Distribution Network is a group of 25,000 employment-related websites with a local, regional, national, industry and niche focus. Net-Temps customers'

More information

A-79. Appendix A Overview and Detailed Tables

A-79. Appendix A Overview and Detailed Tables Table A-8a. Overview: Laws Expressly Granting Minors the Right to Consent Disclosure of Related Information to Parents* Sexually Transmitted Disease and HIV/AIDS** Treatment Given or Needed Alabama 14

More information

NAIC ANNUITY TRAINING Regulations By State

NAIC ANNUITY TRAINING Regulations By State Select a state below to display the current regulation and requirements, or continue to scroll down. Light grey text signifies states that have not adopted an annuity training program. Alabama Illinois

More information

FRANCHISE SALES COMPLIANCE

FRANCHISE SALES COMPLIANCE FRANCHISE SALES COMPLIANCE FRANCHISE SALES COMPLIANCE Federal Law Presale Disclosures Advance Delivery of Franchise Contracts Financial Performance Representations State Franchise Sales Laws Business Opportunity

More information

(In effect as of January 1, 2004*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES FECA LHWCA

(In effect as of January 1, 2004*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES FECA LHWCA (In effect as of January 1, 2004*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES Full Medical Benefits** Alabama Indiana Nebraska South Carolina Alaska Iowa Nevada South Dakota

More information

Expanding Your Business Through Franchising What Steps You Need to Take to Successfully Franchise Your Business. By Robert J.

Expanding Your Business Through Franchising What Steps You Need to Take to Successfully Franchise Your Business. By Robert J. Expanding Your Business Through Franchising What Steps You Need to Take to Successfully Franchise Your Business By Robert J. Steinberger What is a Franchise? California Corporation Code Section 31005.

More information

False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1

False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1 False Claims Laws: What Every Public Contract Manager Needs to Know By Aaron P. Silberman 1 When Do False Claims Laws Apply? The federal False Claims Act (FCA) applies to any requests for payment from

More information

Exhibit 57A. Approved Attorney Fees and Title Expenses

Exhibit 57A. Approved Attorney Fees and Title Expenses Exhibit 57A Approved Attorney Fees and Title Expenses Written pre-approval from Freddie Mac is required before incurring any expense in excess of any of the below amounts. See Sections 71.19 and 71.24

More information

Supreme Court Strikes Down DOMA, Clears Way for Same-Sex Marriage in California

Supreme Court Strikes Down DOMA, Clears Way for Same-Sex Marriage in California Brought to you by Alamo Insurance Group Supreme Court Strikes Down DOMA, Clears Way for Same-Sex On June 26, 2013, the U.S. Supreme Court announced decisions in two significant cases regarding laws affecting

More information

Artisan Contractors Application

Artisan Contractors Application Agency Name: Address: Contact Name: Phone: Fax: Email: Artisan Contractors Application All questions must be answered in full. Application must be signed and dated by the applicant. Applicant s Name Agent

More information

ACE American Insurance Company

ACE American Insurance Company Named Applicant: Date: ACE American Insurance Company ACE Advantage ACE American Insurance Company National Association of REALTORS Professional Liability Name of insurance company to which Application

More information

1 copyright 2012 workers compensation research institute

1 copyright 2012 workers compensation research institute Fees For Worker's Source Of Payments To Worker's Worker's Fee Worker's Fee Formula Alabama Statutory formula: 15% N/A Alaska As stated, 25% of first $1,000 and 10% of 10% of recovery or actual fees, Paid

More information

Percent change. Rank Most expensive states Average expenditure Rank Least expensive states Average expenditure

Percent change. Rank Most expensive states Average expenditure Rank Least expensive states Average expenditure Page 1 of 7 Auto Insurance AAA s 2010 Your Driving Costs study found that the average cost to own and operate a sedan rose by 4.8 percent to $8,487 per year, compared with the previous year. Rising fuel,

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

NAIC Annuity Suitability Requirements by State

NAIC Annuity Suitability Requirements by State NAIC Annuity Suitability Requirements by Specific Alabama Alaska 10/16/2011 TBD Arizona Arkansas If you obtained a life insurance license prior to 10/16/11, you must complete the NAIC course by 4/16/12.

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Comparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015

Comparison of US State and Federal Security Breach Notification Laws. Current through August 26, 2015 Comparison of US State and Federal Security Breach Notification Laws Current through August 26, 2015 Alaska...2 Arizona...6 Arkansas...9 California...11 Colorado...19 Connecticut...21 Delaware...26 District

More information

MAY INSURANCE AGENTS DOING BUSINESS IN THE STATE OF NEVADA RECIEVE BOTH A COMMIS 1 THE CUSTOMER?

MAY INSURANCE AGENTS DOING BUSINESS IN THE STATE OF NEVADA RECIEVE BOTH A COMMIS 1 THE CUSTOMER? MAY INSURANCE AGENTS DOING BUSINESS IN THE STATE OF NEVADA RECIEVE BOTH A COMMISSION AND COMPENSATION FROM THE CUSTOMER? (FORC Journal: Vol. 26 Edition 2 - Summer 2015) Vernon E. Leverty, Esq. (775) 322-6636

More information

FELONY DUI SYNOPSIS. 46 states have felony DUI. Charts 1 and 2 detail the felony threshold for each of the 46 states analyzed.

FELONY DUI SYNOPSIS. 46 states have felony DUI. Charts 1 and 2 detail the felony threshold for each of the 46 states analyzed. FELONY DUI SYNOPSIS The information in the following charts was compiled by examining the felony DUI laws in all 50 sates and the District of Columbia. The analysis focuses on the felony DUI threshold,

More information

LAWYERS PROFESSIONAL LIABILITY INSURANCE POLICY RENEWAL APPLICATION

LAWYERS PROFESSIONAL LIABILITY INSURANCE POLICY RENEWAL APPLICATION LAWYERS PROFESSIONAL LIABILITY INSURANCE POLICY RENEWAL APPLICATION NOTICE: THE POLICY FOR WHICH THIS APPLICATION IS MADE IS A CLAIMS MADE AND REPORTED POLICY. SUBJECT TO ITS TERMS, THE POLICY APPLIES

More information

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) ) ) ) ) ) ) ) ) ) ) ) ) ) CONSENT JUDGMENT

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) ) ) ) ) ) ) ) ) ) ) ) ) ) CONSENT JUDGMENT IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA UNITED STATES OF AMERICA, et al., v. Plaintiffs, HSBC NORTH AMERICA HOLDINGS INC., et al., Defendants. ) ) ) ) ) ) ) ) ) ) ) ) ) ) Civil

More information

April 10, 2015 FLANNER HOUSE OF INDIANAPOLIS INC FLANNER HOUSE ELEMENTARY 2424 DR MARTIN LUTHER KING ST INDIANAPOLIS IN 46208

April 10, 2015 FLANNER HOUSE OF INDIANAPOLIS INC FLANNER HOUSE ELEMENTARY 2424 DR MARTIN LUTHER KING ST INDIANAPOLIS IN 46208 Liberty Mutual Insurance Processing Center PO Box 515097 Los Angeles, CA 90051-5097 April 10, 2015 FLANNER HOUSE OF INDIANAPOLIS INC FLANNER HOUSE ELEMENTARY 2424 DR MARTIN LUTHER KING ST INDIANAPOLIS

More information

No. 2--07--1205 Filed: 12-19-08 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT

No. 2--07--1205 Filed: 12-19-08 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT Filed: 12-19-08 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT WESTPORT INSURANCE Appeal from the Circuit Court CORPORATION, of McHenry County. Plaintiff and Counterdefendant-Appellee, v. No. 04--MR--53

More information

NAIC Annuity Suitability Requirements by State

NAIC Annuity Suitability Requirements by State NAIC Annuity Suitability Requirements by Specific Alabama Alaska 10/16/2011 TBD Arizona Arkansas If you obtained a life insurance license prior to 10/16/11, you must complete the NAIC course by 4/16/12.

More information

A&E Briefings. Indemnification Clauses: Uninsurable Contractual Liability. Structuring risk management solutions

A&E Briefings. Indemnification Clauses: Uninsurable Contractual Liability. Structuring risk management solutions A&E Briefings Structuring risk management solutions Spring 2012 Indemnification Clauses: Uninsurable Contractual Liability J. Kent Holland, J.D. ConstructionRisk, LLC Professional consultants are judged

More information

Englishinusa.com Positions in MSN under different search terms.

Englishinusa.com Positions in MSN under different search terms. Englishinusa.com Positions in MSN under different search terms. Search Term Position 1 Accent Reduction Programs in USA 1 2 American English for Business Students 1 3 American English for Graduate Students

More information

SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. The Board of Governors of the Federal Reserve System (Board), the Federal Deposit

SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. The Board of Governors of the Federal Reserve System (Board), the Federal Deposit SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS The Board of Governors of the Federal Reserve System (Board), the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency

More information

Homeland Insurance Company of New York Homeland Insurance Company of Delaware (Stock companies owned by the OneBeacon Insurance Group)

Homeland Insurance Company of New York Homeland Insurance Company of Delaware (Stock companies owned by the OneBeacon Insurance Group) Homeland Insurance Company of New York Homeland Insurance Company of Delaware (Stock companies owned by the OneBeacon Insurance Group) NETWORK SECURITY AND PRIVACY LIABILITY RENEWAL APPLICATION PORTIONS

More information

Full Medical Benefits**

Full Medical Benefits** (In effect as of January 1, 2006*) TABLE 5a. MEDICAL BENEFITS PROVIDED BY WORKERS' COMPENSATION STATUTES Full Medical Benefits** Alabama Indiana Nebraska South Carolina Alaska Iowa Nevada South Dakota

More information

Hole-In-One Application

Hole-In-One Application > Hole-In-One Application All questions must be answered in full. Application must be signed and dated by the applicant.

More information

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. or branches outside of its home state primarily for the purpose of deposit production.

SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS. or branches outside of its home state primarily for the purpose of deposit production. SECTION 109 HOST STATE LOAN-TO-DEPOSIT RATIOS The Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, and the Office of the Comptroller of the Currency (the agencies)

More information

SUPPLEMENTAL APPLICATION COMMERCIAL GENERAL LIABILITY COMPLETE IN ADDITION TO ACORD APPLICATIONS. ATTACH ADDITIONAL SHEETS AS NECESSARY.

SUPPLEMENTAL APPLICATION COMMERCIAL GENERAL LIABILITY COMPLETE IN ADDITION TO ACORD APPLICATIONS. ATTACH ADDITIONAL SHEETS AS NECESSARY. Kinsale Insurance Company P. O. Box 17008 Richmond, VA 23226 (804) 289-1300 www.kinsaleins.com MANUFACTURERS SUPPLEMENTAL APPLICATION COMMERCIAL GENERAL LIABILITY COMPLETE IN ADDITION TO ACORD APPLICATIONS.

More information

Consent to Appointment as Registered Agent

Consent to Appointment as Registered Agent Consent to Appointment as Registered Agent This form is used by the person or business entity that agrees to act as the registered agent for a limited liability company. Every person or business entity

More information

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1 Data Breach Response Basic Principles Under U.S. State and Federal Law ABA Litigation Section Core Knowledge January 2015 1 I. Introduction Data breaches have become an unfortunate reality for many of

More information

Question by: Karon Beyer. Date: March 28, 2012. [LLC Question] [2012-03-29]

Question by: Karon Beyer. Date: March 28, 2012. [LLC Question] [2012-03-29] Topic: LLC Question Question by: Karon Beyer : Florida Date: March 28, 2012 Manitoba Corporations Canada Alabama Alaska Arizona Arkansas California Colorado Arizona uses "manager" or "member," but not

More information

Licensure Resources by State

Licensure Resources by State Licensure Resources by State Alabama Alabama State Board of Social Work Examiners http://socialwork.alabama.gov/ Alaska Alaska Board of Social Work Examiners http://commerce.state.ak.us/dnn/cbpl/professionallicensing/socialworkexaminers.as

More information

LLC Domestications. Date: March 23, 2015. [LLC Domestication] [March 23, 2015]

LLC Domestications. Date: March 23, 2015. [LLC Domestication] [March 23, 2015] Topic: Question by: : LLC Domestications Earl B. Weaver, Jr. Illinois Date: March 23, 2015 Manitoba Corporations Canada Alabama Alaska Arizona Alabama has removed the term domestication from our Code for

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Data security: A growing liability threat

Data security: A growing liability threat Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars

More information

Product Liability Application All questions must be answered in full. Application must be signed and dated by the applicant.

Product Liability Application All questions must be answered in full. Application must be signed and dated by the applicant. Agency Name: Address: Contact Name: Phone: Fax: Email: Product Liability Application All questions must be answered in full. Application must be signed and dated by the applicant. Applicant s Name Agent

More information

STATE-SPECIFIC ANNUITY SUITABILITY REQUIREMENTS

STATE-SPECIFIC ANNUITY SUITABILITY REQUIREMENTS Alabama Alaska Arizona Arkansas California This jurisdiction has pending annuity training legislation/regulation Annuity Training Requirement Currently Effective Initial 8-Hour Annuity Training Requirement:

More information

State Tax Information

State Tax Information State Tax Information The information contained in this document is not intended or written as specific legal or tax advice and may not be relied on for purposes of avoiding any state tax penalties. Neither

More information

Data Breach Notification: State and Federal Law Requirements. Good News

Data Breach Notification: State and Federal Law Requirements. Good News Data Breach Notification: State and Federal Law Requirements Donna Maassen, CHC Director of Compliance Extendicare Health Services, Inc. & Andrew G. Conkovich, CHC Director of Regulatory Affairs & Compliance

More information

State Income Taxation of Trusts - Fifty-One Different Stories and a Few Surprise Endings

State Income Taxation of Trusts - Fifty-One Different Stories and a Few Surprise Endings Chicago Estate Planning Council January 22, 2012 State Income Taxation of Trusts - Fifty-One Different Stories and a Few Surprise Endings Christine L. Albright Holland & Knight LLP This document is not

More information

State Specific Annuity Suitability Requirements updated 10/10/11

State Specific Annuity Suitability Requirements updated 10/10/11 Alabama Alaska Ai Arizona Arkansas California This jurisdiction has pending annuity training legislation/regulation Initial 8 Hour Annuity Training Requirement: Prior to selling annuities in California,

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

Reflections on Ethical Issues In the Tripartite Relationship

Reflections on Ethical Issues In the Tripartite Relationship Reflections on Ethical Issues In the Tripartite Relationship [click] By Bruce A. Campbell 1 Introduction In most areas of the practice of law, there are a number of ethical issues that arise on a frequent

More information

2014 INCOME EARNED BY STATE INFORMATION

2014 INCOME EARNED BY STATE INFORMATION BY STATE INFORMATION This information is being provided to assist in your 2014 tax preparations. The information is also mailed to applicable Columbia fund non-corporate shareholders with their year-end

More information

BUSINESS DEVELOPMENT OUTCOMES

BUSINESS DEVELOPMENT OUTCOMES BUSINESS DEVELOPMENT OUTCOMES Small Business Ownership Description Total number of employer firms and self-employment in the state per 100 people in the labor force, 2003. Explanation Business ownership

More information

Low-Profit Limited Liability Company (L3C) Date: July 29, 2013. [Low-Profit Limited Liability Company (L3C)] [July 29, 2013]

Low-Profit Limited Liability Company (L3C) Date: July 29, 2013. [Low-Profit Limited Liability Company (L3C)] [July 29, 2013] Topic: Question by: : Low-Profit Limited Liability Company (L3C) Kevin Rayburn, Esq., MBA Tennessee Date: July 29, 2013 Manitoba Corporations Canada Alabama Alaska Arizona Arkansas California Colorado

More information

The Effect of Product Safety Regulatory Compliance

The Effect of Product Safety Regulatory Compliance PRODUCT LIABILITY Product Liability Litigation The Effect of Product Safety Regulatory Compliance By Kenneth Ross Product liability litigation and product safety regulatory activities in the U.S. and elsewhere

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

RENEWAL APPLICATION TECHNOLOGY PROFESSIONAL LIABILITY APPLICATION

RENEWAL APPLICATION TECHNOLOGY PROFESSIONAL LIABILITY APPLICATION Kinsale Insurance Company P. O. Box 17008 Richmond, VA 23226 (804) 289-1300 www.kinsaleins.com RENEWAL APPLICATION TECHNOLOGY PROFESSIONAL LIABILITY APPLICATION APPLICANT S INFORMATION 1. Current Kinsale

More information

Cloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers

Cloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers Cloud Coverage Transcending the Cloud A Legal Guide to the Risk and Rewards of Cloud Computing Cloud Coverage Authors Richard P. Lewis, Partner rlewis@reedsmith.com Carolyn H. Rosenberg, Partner crosenberg@reedsmith.com

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

A GUIDE TO VOTING LEAVE LAWS BY STATE

A GUIDE TO VOTING LEAVE LAWS BY STATE State Alabama Public and private s Time necessary to vote, not exceeding one hour, unless employee has two hours before work or after work available to vote. Alaska All s Not specified, but must allow

More information

What would you do if your agency had a data breach?

What would you do if your agency had a data breach? What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

2015 ACEP POLL AFFORDABLE CARE ACT RESEARCH RESULTS

2015 ACEP POLL AFFORDABLE CARE ACT RESEARCH RESULTS 2015 ACEP POLL AFFORDABLE CARE ACT RESEARCH RESULTS Prepared For: American College of Emergency Physicians March 2015 2015 Marketing General Incorporated 625 North Washington Street, Suite 450 Alexandria,

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Model Regulation Service July 2005 LIFE INSURANCE MULTIPLE POLICY MODEL REGULATION

Model Regulation Service July 2005 LIFE INSURANCE MULTIPLE POLICY MODEL REGULATION Table of Contents Section 1. Section 2. Section 3. Section 4. Section 5. Section 6. Section 1. Model Regulation Service July 2005 Purpose Authority Exemptions Duties of Insurers Severability Effective

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

State Tax Information

State Tax Information State Tax Information The information contained in this document is not intended or written as specific legal or tax advice and may not be relied on for purposes of avoiding any state tax penalties. Neither

More information

Tax Research: Understanding Sources of Tax Law (Why my IRC beats your Rev Proc!)

Tax Research: Understanding Sources of Tax Law (Why my IRC beats your Rev Proc!) Tax Research: Understanding Sources of Tax Law (Why my IRC beats your Rev Proc!) Understanding the Federal Courts There are three levels of Federal courts that hear tax cases. At the bottom of the hierarchy,

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

Anatomy of a Hotel Breach

Anatomy of a Hotel Breach Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent

More information

FACT SHEET. Language Assistance to Persons with Limited English Proficiency (LEP).

FACT SHEET. Language Assistance to Persons with Limited English Proficiency (LEP). FACT SHEET Office of Civil Rights Washington, D.C. 20201 (202) 619-0403 Language Assistance to Persons with Limited English Proficiency (LEP). To ensure that persons with limited English skills can effectively

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

MASS MARKETING OF PROPERTY AND LIABILITY INSURANCE MODEL REGULATION

MASS MARKETING OF PROPERTY AND LIABILITY INSURANCE MODEL REGULATION Table of Contents Model Regulation Service January 1996 MASS MARKETING OF PROPERTY AND LIABILITY INSURANCE MODEL REGULATION Section 1. Section 2. Section 3. Section 4. Section 5. Section 6. Section 7.

More information

US Department of Health and Human Services Exclusion Program. Thomas Sowinski Special Agent in Charge/ Reviewing Official

US Department of Health and Human Services Exclusion Program. Thomas Sowinski Special Agent in Charge/ Reviewing Official US Department of Health and Human Services Exclusion Program Thomas Sowinski Special Agent in Charge/ Reviewing Official Overview Authority to exclude individuals and entities from Federal Health Care

More information

Agency Name. Agency TIN

Agency Name. Agency TIN Producer Data Sheet Business Through Broker/Dealer, Broker/Dealer Affiliated Agency, or Bank Agency For Insurance License Appointment with Jackson National Life Insurance Company, Jackson National Life

More information

State Collision Repair Laws and Regulations

State Collision Repair Laws and Regulations State Collision Repair Laws and Regulations Alabama In Alabama, the vehicle owner has the right to know that non-oem parts will be The logo, identification number or name of the manufacturer of all non-oem

More information

American C.E. Requirements

American C.E. Requirements American C.E. Requirements Alaska Board of Nursing Two of the following: 30 contact hours 30 hours of professional nursing activities 320 hours of nursing employment Arizona State Board of Nursing Arkansas

More information

Real Progress in Food Code Adoption

Real Progress in Food Code Adoption Real Progress in Food Code Adoption August 27, 2013 The Association of Food and Drug Officials (AFDO), under contract to the Food and Drug Administration, is gathering data on the progress of FDA Food

More information