Articles by Joshua Gold
Whether you already have a political risk insurance policy, are facing renewal or are considering purchasing a policy for the first time, a careful review of policy terms will be worthwhile.
As data breaches grow large enough to savage a company’s bottom line, management liability insurance and senior level governance cannot be overlooked
D&O insurance policyholders must make sure that excess policies do not include unduly restrictive exhaustion clauses that can negate coverage.
Policyholders need to be aware of all the nuances of product recall insurance in order to ensure that their claim will be paid.
Whether your business aggressively uses social media to reach potential or existing customers, or simply maintains a minimal presence, these platforms can trigger a wide variety of risks to your organization.
With some insurance policies, the distinction between wind v. flood and the timing of resulting damage can be crucial in successfully obtaining insurance dollars to offset losses when the worst happens.
Insurance companies are slow to pay out for settlement costs — if they agree to pay at all. Here are some ways to improve the odds.
Cloud computing offers major benefits but also presents new challenges to data security.
As the devastation wrought by Superstorm Sandy brought home, natural disasters can imperil even the most rock-solid businesses.
Smart data-handling procedures and quality insurance coverage can lessen the blow of unauthorized or unintended uses of business-related data.
Ambiguity surrounding the Nonadmitted and Reinsurance Reform Act has created confusion for all captive owners.
Some property insurance policies provide coverage for losses of business income even when there is no property damage at all.
Developing a disaster recovery plan and assembling a team to implement that plan, before a loss occurs, is invaluable.
Recent court decisions have gone against long-standing case law regarding excess insurance claims recovery.
The SEC is now mandating companies to disclose their cybersecurity vulnerabilities. Here are three ways to stay out of related disputes.