Risk Management

Cash in an envelope.

Plaintiff Sues Over False Positive On $100K Online Jackpot

A woman who says she won $100,000 in an online slots game but was then told there had been a […]

Two partially obscured figures talking or gesturing at each other, as if in discussion.

When You Need To Sue Your Insurance Broker

A policyholder’s coverage attorney typically advocates for a claim, sometimes in the face of resistance from the carrier, and that […]

A Michael Jordan sneaker

Specialty Insurance Gains New Foothold

A former business development manager at Microsoft owns a “treasure chest of sneakers,” augmented by the lucky discovery of a […]

Crossed spades in front of stylized mountain logo.

Jenner’s Investigations Niche; Now It’s The Movie-Set Shooting

Chicago law firm Jenner & Block, whose roots go back more than a century, is right in the middle of […]

German & Israeli flags on adjoining waiting room chairs

German, Israeli Police Cooperate, As Israel Becomes A Hub Of On-Line Financial Fraud

At the behest of German authorities, Israeli police raided a call center in Petah Tikvah, Israel, and detained 15 people. […]

Stylized document page, with successive lines of text, and a pencil ready to mark the page.

A Recommended Framework For IP Risk Management

Recognizing IP risks in advance is the best way to mitigate them and avoid being blindsided, either by losing rights […]

Industrial smokestacks in background, justice scales mounted on big stack in foreground.

The Prospect For D&O Climate Liability Claims

A recent study looks at how, in today’s legal environment, a board’s failure to adequately address climate change-related issues could […]

Quill pen, book open, castle and abacus in the background.

Sorry Facebook, That Name Is Taken, Says PC Maker

Meta PCs, a Scottsdale AZ-based company that assembles and sells high-performance gaming computers, has been around for more than a […]

Double-sided human face, partly covered with hands.

A Consultant’s Recipe For Fraud Control

A consultant boils in-house fraud control down to six components. First on his list is “visible, vocal leadership support,” starting […]

Antique line drawing of someone being in a chair being questinoned

Giving TPSPs The Third Degree

Cybers attacks that gain access through a vendor or supply chain partner have become increasingly common. The SolarWinds hack is […]

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top