Contributor Page
Anderson Kill
 
Email  |  Website  |  Articles
Contact Details
Tel: +1 212 278-1339
Fax: +1 212 278-1733
1251 Avenue of the Americas New York
New York
United States
By Pamela Hans, Christina Yousef
A lawsuit of any magnitude can be devastating for your business, whether it mani¬fests its hardship financially or otherwise.
By Cort Malone, Jorge Aviles
While high-profile cyber breaches of major government and corporate databases continue to dominate headlines, less consideration has been paid to the ever-increasing cyber risks associated with the use of personal mobile devices and their apps, including those connected to social media.
By Finley T. Harckham, Marshall Gilinsky
While the human suffering triggered by Hurricanes Harvey and Irma unfolded in real time on our TV screens, opening American hearts and wallets and triggering heroic volunteer rescue e.orts, the full extent of the economic damage will not be evident for some time.
By Joshua Gold
Today's cyberthreats can trigger multi-faceted losses. A serious cyber incident could cause bodily injury, property damage, business interruption, shareholder litigation, customer privacy litigation, regulatory action, terminations or resignations among senior management, and reputation damage.
By Bennett Pine
If you thought your company had long ago covered all bases with respect to sexual harassment, think again.
By Joshua Gold
From a risk management point of view, there are plenty of lessons to be learned from the recent data security compromise at Equifax.
By Peter Halprin, Vivian Costandy Michael
Faced with a growing number of insolvencies worldwide and a global crash in commodities prices, trade credit insurance policyholders are increasingly filing claims.
By Finley T. Harckham
Hurricane Harvey tore up large areas of the Texas Gulf Coast with gale-force winds and storm surge, and then inundated vast areas, including Houston, with unprecedented amounts of rain.
By Robert Chesler
In the cyberworld in which we live, the liabilities that seem to concern us most are intangible attacks like hacking, phishing and ransomware.
By Robert Chesler
Crime policies, among others, typically provide what seems like a broad grant of computer coverage, such as "We will pay for loss … resulting directly from the use of any computer to fraudulently cause a transfer … ."
By Raymond Mascia Jr.
Under the "efficient proximate cause" rule, if the initial event causing a loss is a covered peril, an insurance policy must provide coverage even if a subsequent event in the chain, which also may have caused the loss, is excluded under the policy.
By Deborah Koplovitz
You have made the largest purchase of your life to date: a beautiful new construction condominium unit.
By Robert Chesler
Over the past five years, companies have become conversant with a broad range of cyberthreats.
By Robert Horkovich, Stephen Palley
Businesses are increasingly coming into contact with a new form of data storage and transmission known as blockchain.
By Stephen Palley, Peter Halprin
A recent decision from the U.S. District Court for the Western District of Virginia highlights a potential problem with file sharing.
Contributor's Topics
More...