Recent developments in European Consumer Law: Unintentionally becoming an apparent producer – Insurance Law Secure

AG Campos Sánchez-Bordona elaborated today on the notion of a producer under the Product Liability Directive (Directive 85/374) in the case Ford Italia (C-157/23). A consumer in this case purchased a Ford Mondeo car from Stracciari, Ford’s dealer in Italy. The car itself was manufactured by Ford WAG, a German company, which used another company, … Read more

Allstate customers using safe driving app have 25% fewer severe collisions – Insurance Law Secure

NORTHBROOK, Ill., April 17, 2024 – Allstate customers have a choice to opt into the Allstate app’s safe driving features and those who do are safer on the road, according to Allstate and its mobility data and analytics partner Arity. Allstate found customers who choose to use Drivewise are 25% less likely to have a … Read more

Morningstar Publishes Fourth Annual Corporate Sustainability Report – Insurance Law Secure

Morningstar drives transparency in efforts to minimize racial and gender-adjusted pay gaps and discloses climate-related risks and opportunities in latest sustainability reports CHICAGO–(BUSINESS WIRE)– Morningstar, Inc. (Nasdaq: MORN), a leading provider of independent investment insights, today published its fourth annual Corporate Sustainability Reportexamining the company’s efforts to incorporate sustainability practices and environmental, social, and governance … Read more

How to verify the authenticity and origin of photos and videos – Insurance Law Secure

Over the past 18 months or so, we seem to have lost the ability to trust our eyes. Photoshop fakes are nothing new, of course, but the advent of generative artificial intelligence (AI) has taken fakery to a whole new level. Perhaps the first viral AI fake was the 2023 image of the Pope in … Read more

What is Cyber Insurance (and is it worth it)? – Defend Cyber

What is Cyber Insurance (and is it worth it)? Cyber insurance is designed to supply a financial safety net for businesses facing the aftermath of cyber incidents. These policies typically encompass a range of costs, including but not limited to, the technical procedures needed for data recovery, repair or replacement of compromised hardware, business interruption … Read more

x