The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
- July 01, 2020Ryan Drimalla and Karl Dorwart
According to news reports, and judging from the plethora of lawsuits filed seeking insurance coverage for lost income incurred as a result of the COVID-19 pandemic, insurance companies are for the most part denying claims for business interruption losses. The type of insurance claim at issue may make a difference.
July 01, 2020Howard B. Epstein and Theodore A. KeyesIn an environment of moving targets, it seems unimaginable that insurance against cybersecurity attacks can be robust enough to provide real protection. There are many types of risks involved, and some include physical damage to property.
April 01, 2019Nina CunninghamMany companies remain overwhelmed by the prospect of developing a cybersecurity program. Too many still see cyber crime as an IT issue, and simply defer to that department. Cybersecurity is most definitely an information security issue and it must be treated as such. Failure to recognize this concept almost ensures a weak cybersecurity program that remains highly vulnerable to breaches.
April 01, 2018Collin J. HiteThe recent decision in Sears Roebuck & Co. and Kmart Corp. v. W/S Lebanon LLC seems timely in light of the fact that commercial landlords, tenants and their insurance providers are grappling with the problems caused by the extreme wind and rain of hurricanes. Here's what happened in that case.
November 02, 2017Janice G. InmanWith expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
October 02, 2017Jeff TonPart Two of a Two-Part Article
Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.
August 01, 2017Kevin QuinleyA man returns home unexpectedly, finds his wife with another man, and shoots him. It's an unfortunate chain of events, but certainly not unheard of. What is unusual is how the case of a love triangle like this one could lead to an Eleventh Circuit decision about homeowners' insurance.
August 01, 2017Janice G. InmanOver nearly eight years as U.S. Attorney for the Southern District of New York, Preet Bharara became recognized as a powerful prosecutor in many areas, including government corruption and white-collar crime. Another subject for which he certainly deserves mention is his strong record helping to fight insurance fraud in New York.
July 01, 2017Evan H. KrinickIT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.
April 02, 2017Sean B. Cooney











