Skip to Content

Specialty Lines Articles


Latest Articles

Cyber and Privacy Risk and Insurance

Hacking, Malware, and Social Engineering—Definitions of and Statistics about Cyber Threats Contributing to Breaches

2012-01-28 | Melissa J Krasnow

Melissa Krasnow describes these threats as well as pretexting, phishing, and spear phishing.

Cyber and Privacy Risk and Insurance

Securities and Exchange Commission Issues Guidance on Cyber Security and Cyber Incident Disclosure

2011-12-31 | Melissa J Krasnow

Federal securities laws mandate timely, comprehensive, and accurate disclosure of risks investors would deem important. Melissa Krasnow explains.

Cyber and Privacy Risk and Insurance

The Militarization of Cyber Space and the Risks for US Businesses

2011-11-01 | Gary E Clayton

Traditional risk management principles are ineffective against cyber risks. Gary Clayton explains.

Cyber and Privacy Risk and Insurance

SEC Requires Disclosure of Cyber Attacks

2011-10-01 | Gary E Clayton

New cyber security disclosure requirements may impact firms' stock, contractual relationships, and ability to import personal data. Gary Clayton explains.

Employment Practices

Supreme Court Rules California's Prohibition of Class Action Waivers in Arbitration Agreements Preempted by Federal Law

2011-05-01 | Paul Siegel

The Supreme Court upholds the enforceability of arbitration agreements. Paul Siegel relates the case.

Employment Practices

Supreme Court Broadens Title VII Associational Retaliation Claims

2011-03-01 | Paul Siegel

Paul Siegel describes a recent employment case where the antiretaliation provision is applied to third parties.

Corporate Fraud Prevention

Fraud in Major Contract Projects

2011-01-01 | Scott Langlinais

Perpetrators operate best in the dark. Scott Langlinais discusses how to uncover dishonest acts.

Employment Practices

Supreme Court: Public Employer Search Not Unreasonable under Fourth Amendment

2010-08-01 | Paul Siegel, Noel P Tripp

Relating a recent Supreme Court case, Paul Siegel notes the importance of thorough computer and electronic equipment usage policies.

Corporate Fraud Prevention

Five-Step Approach to Fraud Detection: #4 Build Audit Programs/Detective Processes to Look for Symptoms

2010-07-17 | Scott Langlinais

In step 4 of his 5-Step Approach to Fraud Detection, Scott Langlinais says to include symptom detection in audit programs.

Corporate Fraud Prevention

Five-Step Approach to Fraud Detection: #3 Be Alert to Symptoms

2010-06-01 | Scott Langlinais

In his 'Five-Step Approach to Fraud Detection,' Scott Langlinais shows how to ferret out collusion.