Insurance is a key part of managing risk and protecting against unexpected financial losses. Individuals and businesses alike can benefit from the right coverage, whether it be your personal auto policy, commercial general liability policy, or property damage coverage. But don’t assume that just because you have a policy you are fully covered. Insurance policies are often full of exclusions and fine print. Even with the most reputable insurers, policies are rarely “one size fits all.”
A recent Illinois appellate court decision is a prime example. In Farmers Insurance Exchange v. Cheekati, et al., 2022 IL App (4th) 210023, the insureds were homeowners who, while unable to sell their property, rented it to a tenant. That tenant was injured when a defective staircase at the home collapsed. The insureds made a claim under their homeowner’s policy with Farmers, undoubtedly expecting they would be covered for the injury occurring in their home. They were not—Farmers denied coverage based on two policy exclusions: the first preluded coverage for bodily injury to any insured or any “resident of the residence premises;” the second precluded coverage for bodily injury “in connection with the rental or holding for rental” of the premises. Based on those exclusions, the appellate court affirmed the trial court’s judgment in favor of Farmers, declaring that it had no duty to defend or provide coverage to its insureds.
The lesson here: review your policy documents carefully and make sure you are getting the coverage you think you are paying for. For more information regarding these or similar issues, please contact Mark L. Evans at email@example.com or (312) 368-0100.
With “hacking” and identify thefts becoming all too common place, each service provider must place more and more emphasis on protecting itself from legal liability caused by not only its own actions, but the actions of the company(ies) to whom it outsources. This article provides an introduction to contracting for service providers with an eye toward gaining legal platform upon which to adequately defend itself, if necessary.
In addition to government compliance, which will vary depending upon the industry, any company that collects personal information during the course of providing its services must take steps to safeguard itself from legal liability arising due to unwanted disclosures. One way to provide a legal safety net is to consider the applicable issues in the service provider’s agreement. The following is an abbreviated checklist.
- Whether personally identifiable information will be provided to service provider’s employees, and if so, what measures are taken to narrowly tailor the need to expose such information to only those employees or third parties who need to know in order to provide the service. In considering this, a service provider may want to consider identifying types of employees or third parties that may be exposed to such information, or even listing such persons and having them sign a confidentiality agreement with respect to such information.
- When does a service provider have to notify a customer of a security breach? Is there an obligation to notify customers of a potential privacy-related compliance issue? Or, only when a security breach has occurred? If a security breach is defined, service providers will be required to undertake all tasks from notification to remediation and payment for such remediation upon receipt of a complaint.
- While necessary, service providers will want to limit their contractual obligations to comply with compliance with IT management standards such as the International Organization for Standardization certification.
- If the service provider receives credit card information of customers, then at the very least, the following issues must be considered:
- Limitation of access of personal information to authorized employees or parties
- Securing business facilities, data centers, paper files, servicers, backup systems and computing equipment (mobile and other equip with info storage capability;
- Implementing network/ device application, database and platform security
- Securing info transmission storage and disposal
- Implementing authorization and access controls with media, apps, operating systems and equipment
- Encrypting highly sensitive personal information stored on any mobile media
- Encrypting highly sensitive transmitted over public or wireless networks
- Strictly segregating personal information from and info of service provider or its other customers so that personal information is not commingled;
- Implementing appropriate personnel security and integrity procedures and practices (conducting background checks, and providing appropriate privacy and info security training to service providers’ employees.
If you have any questions regarding your liability for disclosure of personal information, please contact:
Natalie Remien at:
firstname.lastname@example.org or (312) 368-0100.