| Read Time: < 1 minute | Newsletters

2019 Ohio Law Summary eBook

This FREE download is a comprehensive guide for insurance professionals who handle Ohio claims. 2019 OH Law Summary eBook Topics include: Claims Evidentiary Issues Statutes of Limitation Defenses Damages Coverage Issues Subrogation & Liens Claims Handling

Continue Reading

| Read Time: < 1 minute | Newsletters

Part 3: The Legal Repercussions of a Cyber Security Breach

In addition to being unaware of the growing menace, many companies do not have the appropriate insurance coverages in place to deal with a cyber breach. It is estimated that only less than half have any coverage at all (Insurance Journal Nov. 6, 2015). In fact, insurance experts have characterized the cyberinsurance marketplace as the “Wild Wild West”. Policies differ, policies from the same carrier differ, and the policies differ year to year. Trusted counsel and insurance experts should scrutinize if cyber attacks are covered and what services are paid for by the policy. Just because it happens online and it’s connected with a computer does not mean that it’s covered by what an insurer would consider a cyber –policy. It depends on the terms of the policy and not the mere buzz words of cyber or privacy liability insurance. There also may be exclusions dealing with the failure by the insured to implement requisite risk controls and procedures on a continual basis. Read More: Cyber Security Part 3 This article is the third installment of a 3-part series on cyber security: Read Part 1 here. Read Part 2 here.  

Continue Reading

| Read Time: < 1 minute | Newsletters

2016 Ohio Law Summary

This FREE download is a comprehensive guide for insurance professionals who handle Ohio claims. 2016 OH Law Summary eBook         Topics include: Claims Evidentiary Issues Statutes of Limitation Defenses Damages Coverage Issues Subrogation & Liens Claims Handling

Continue Reading

| Read Time: < 1 minute | Newsletters

Part 2: The Legal Repercussions of a Cyber Security Breach

When a computer security breach occurs how should it be handled with customers and clients? Is there immediate public disclosure, or is there first a careful investigation and scrutiny of what occurred and what data was compromised? The proper strategy must be developed preemptively along with related training to instruct employees how to handle the issue. The most forward thinking businesses go a step further and conduct training simulations with employees to simulate cyber attacks and data security breaches. Read More: Cyber Security Part 2 This article is the second installment of a 3-part series on cyber security. Read Part 1 here.

Continue Reading

| Read Time: < 1 minute | Newsletters

Part 1: The Dawning of the Age of Cyber Awareness

In 2015 alone, cyber experts indicate that losses due to cyber crime exceeded $400 billion dollars worldwide. Attacks were not limited to the huge retailers, medical providers, financial groups or shipping ports; in fact many hackers don’t know the company they have breached until after they have gained access. Anyone who has records of personal information is subject to risk. Read More: Cyber Security Part 1

Continue Reading

| Read Time: < 1 minute | Newsletters

Is your legal house in order?

When all progresses as expected, the transition of your business to the next generation can be a smooth process with minimal anxiety. Unfortunately, many family-owned businesses operate under the assumption that ownership and control will pass to a spouse or the next generation based on internal family discussion and understanding. As a consequence, many organizations fail to take the necessary legal steps for the proper transfer of the business interest upon the unexpected event. Read more: April 2016 Business Succession Planning

Continue Reading

| Read Time: < 1 minute | Newsletters

Companies face expansive wage liability for shared workers

Does your business hire labor through staffing agencies or subcontractors? Do you share workers with another company? If so, new interpretive guidance from the U.S. Department of Labor (“DOL”) Wage & Hour Division suggests you should pay careful attention to those shared workers and their hours, as your business could be responsible for more of their wages than you might expect. Read More – March 2016 – Joint Employment Interpretations

Continue Reading

| Read Time: < 1 minute | Newsletters

Secretly Recorded Patient Conversations – How Doctors Can Protect Themselves

More than ever, patients are requesting to record conversations with their health care providers. Unfortunately, there has also been an alarming number of medical malpractice cases filed where patients have secretly recorded their doctors and nurses and have effectively elicited detrimental comments made in the spirit of disclosure and with the sense, from the physician’s perspective, that the conversations were private. How can doctors protect themselves against patient use of technology? Read more: Medical Malpractice – Secret Recordings

Continue Reading

| Read Time: < 1 minute | Newsletters

Do you have coverage for defective workmanship?

The answer to the question of coverage for defective workmanship depends upon the location where the work is being performed and specifically which state law is applied to the coverage question. While the majority of the states maintain a position that defective workmanship is not covered because it is not an “occurrence,” there appears to be a growing number of states that embrace the position that there are some circumstances, particularly when the defective work is performed by subcontractors, that the defective workmanship can be covered. Read More: Understanding CGL Policy Coverage

Continue Reading