Deadline for Hurricane Ian Disaster Recovery Applications Announced
October 17, 2022 —
Lewis BrisboisWashington, D.C. (October 11, 2022) - On Friday, October 7, 2022, the Florida Division of Emergency Management (FDEM) announced that applications for the Federal Emergency Management Agency’s (FEMA) Public Assistance Grant Program are due by October 29, 2022.
FEMA provides disaster recovery assistance to eligible individuals, families, governments, and private non-profit entities. However, the process for recovering costs is complicated, and FEMA has broad discretion to determine whether applicants and their expenses are eligible. All too often, failure to understand FEMA regulations or submit sufficient documentation results in FEMA denying applicants’ claims, leaving individuals, local governments, and non-profits to bear the full cost of recovery.
While ensuring successful recovery through the FEMA grant program can be challenging, clients can increase their likelihood of success when preparing the initial application and documentation by enlisting experienced legal counsel who understand the FEMA process and regulations.
Read the court decisionRead the full story...Reprinted courtesy of
Lewis Brisbois
N.J. Governor Fires Staff at Authority Roiled by Patronage Hires
August 20, 2019 —
Elise Young, BloombergNew Jersey Governor Phil Murphy’s administration fired 30 employees of a state authority that finances local school construction after an independent review found that his former appointee stacked it with friends, family and political contacts who were unqualified for their jobs.
All but three of those dismissed Tuesday from the Schools Development Authority had been hired by Lizette Delgado-Polanco, the former chief executive officer who resigned in April amid media scrutiny of her oversight. A review by an outside law firm faulted the agency for “patronage-type hires” that undermined its work.
Read the court decisionRead the full story...Reprinted courtesy of
Elise Young - Bloomberg
The "Dark Overlord" Strikes The Practice Of Law: What Law Firms Can Do To Protect Themselves
April 17, 2019 —
Ivo G. Danielle – Newmeyer & DillionCybersecurity breaches involving law firms are on the rise with each passing year. Law firms are prime targets for cyber criminals seeking confidential and sensitive information because of the various types of legal work that law firms normally handle for their clients. Whether it be mergers and acquisitions, the use of intellectual property, purchase agreements, bankruptcy or even litigation involving divorce, law firms are a rich depository for highly confidential and sensitive information. As a result, law firms must employ comprehensive security measures to protect themselves from security breaches or risk being on the losing end of a costly malpractice claim, and suffer severe reputational harm.
Law Firms Continue To Be Targeted By Cybercriminals
According to the American Bar Association ("ABA") 2018 Legal Technology Survey Report, 23% of the law firms who participated in the survey reported that their law firm experienced a data breach. Although this may be just a 1% increase from the 22% who reported a breach in 2017, it is important to understand that this is an increase of 8% from the stable percentages reported from 2013 through 2016.1 The 2018 survey report also revealed that security breaches fluctuated with firm size – 14% for solo law firms, 24% for firms employing 2-9 attorneys, approximately 24% for firms with 10-49 attorneys, 42% for firms with 50-99 attorneys, and approximately 31% for those firms employing 100 or more attorneys.
Latest Law Firm Security Breaches
The notorious criminal group called "The Dark Overlord" has a history of committing data breaches of high profile companies such as Gorilla Glue, Netflix, Larson Studios, multiple healthcare companies, and Little Red Door Cancer Agency. Their goal is simple – steal sensitive information and then extort payment from the victims by threatening to release the sensitive information to the public.
On December 31, 2018, this cybercriminal group announced to the world that they had acquired 18,000 documents containing highly sensitive legal information related to insurance based litigation connected to the 9/11 tragedy. The stolen information was the attorney/client property of Lloyd's of London, Silverstein Properties, and Hiscox Syndicates, Ltd. In its announcement, The Dark Overlord boasted that they were in possession of client sensitive information, such as: "emails; retainer agreements; non-disclosure agreements; settlements, litigation strategies; liability analysis; defense formation; collection of expert witness testimonies; communication with government officials in countries all over the world; voice mails; dealings with the FBI, USDOJ, DOD, confidential communications, and so much more."
Subsequent to the data breach, The Dark Overlord announced to the public that they designed a compensation plan that would allow for public crowd-funding for its organization to permit the public to view the stolen information in exchange for bitcoin payment. The more public funding it receives, the more stolen sensitive information will be unlocked and released to the public. It is estimated that this cybercriminal group already distributed information to the public on two separate occasions during the month of January 2019.
High profile cybersecurity breaches of law firms is nothing new – for example, the infamous Panama Papers breach, where cybercriminals leaked 11.5 million documents exposing the shadowy business of setting up offshore corporations as tax shelters for businesses, celebrities, and politicians - and the infamous Petya Malware attack which resulted in a digital lockdown of one of the world's largest law firms, DLA Piper. However, despite the infrequency of publicized cyber-attacks of law firms by the media, the FBI has recently announced that law firms should expect an increase in security attacks by cybercriminals because law firms are now viewed as "one-stop shops" for cybercriminals. Therefore, in order to combat the inevitable increase in cyber-attacks, law firms must get prepared.
How Law Firms Can Protect Themselves
All law firms will agree that the most serious consequence of a security breach for their firm would be the unauthorized access to sensitive client data. The American Bar Association's Model Rules of Professional Conduct, specifically Rules 1.1 and 1.62 and related Comments, require an attorney to take competent and reasonable measures to safeguard information relating to their clients. This duty to "safeguard' information imposes a significant challenge to firms when using technology in connection with protecting client information because most law firms are not savvy with technology and lack proper cyber security training.
In order for a law firm to protect itself from security breaches and inadvertently violate its duty of safeguarding a client's sensitive information, it is important to take the following actions:
- Start by taking an inventory and risk assessment of the firm to determine what needs to be protected – the inventory should include both technology and data;
- Develop, implement and maintain an appropriate cybersecurity program that complies with applicable ethical and legal obligations;
- Ensure the cybersecurity program addresses people, policies and procedures, and technology. The cybersecurity program must designate an individual or a group to be in charge and coordinate security;
- Develop an incident response plan scaled to the size of the firm;
- Continually train staff and attorneys to identify and understand potential cybersecurity threats;
- Consider implementing a third-party assessment of firm's cybersecurity program and policies;
- Purchase cyber liability for insurance which not only covers first party losses to law firms (like lost productivity, data restoration, and legal expenses) but also liability protection to third parties;
- Implement authentication and access controls for network, computers and mobile devices used by the firm's staff and attorneys;
- Consider the use of full-drive encryption for computers and mobile devices;
- Have staff and attorneys avoid and/or limit the use of public WiFi when working remotely; and
- Create a disaster recovery plan to backup all data in the event of a cyber-attack or natural catastrophe.
Continually reviewing, implementing, training and updating a firm's cybersecurity program and protocols will help safeguard sensitive and confidential client information and/or data. No law firm wants to be the next data breach headline – so take the necessary steps to avoid a potential disaster.
1 Past ABA Legal Technology Surveys reported 14% in 2016, 15% in 2015, 14% in 2014 and 15% in 2013.
2 On November 1, 2018, California adopted ethics rules patterned after the ABA Model Rules of Professional Conduct.
Ivo Daniele is a seasoned associate in Newmeyer & Dillion's Walnut Creek office. His practice includes representing private and public companies with both their transactional and litigation needs. You can reach Ivo at ivo.daniele@ndlf.com.
About Newmeyer & Dillion
For almost 35 years, Newmeyer & Dillion has delivered creative and outstanding legal solutions and trial results for a wide array of clients. With over 70 attorneys practicing in all aspects of business law, privacy & data security, employment, real estate, construction, insurance law and trial work, Newmeyer & Dillion delivers legal services tailored to meet each client's needs. Headquartered in Newport Beach, California, with offices in Walnut Creek, California and Las Vegas, Nevada, Newmeyer & Dillion attorneys are recognized by The Best Lawyers in America©, and Super Lawyers as top tier and some of the best lawyers in California, and have been given Martindale-Hubbell Peer Review's AV Preeminent® highest rating. For additional information, call 949.854.7000 or visit www.ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of
What to Know Before Building a Guesthouse
September 17, 2014 —
Cynthia Flash – BloombergThose tiny, often very cute homes that people are adding on their properties seem to be popping up everywhere these days. The tiny buildings can provide extra rental income, offer a less-expensive housing option or provide a home for a relative.
Accessory dwelling units, or ADUs, are second dwelling units created on a lot with an existing house or attached house. They’re often referred to as mother-in-law apartments, granny flats or studio apartments. As a homeowner, what are the legal issues to consider before building an ADU of your own?
Different cities, different rules
First off, different cities have different rules. Before plotting the space for your new tiny house, check with your city’s planning and zoning department to determine what those rules are. You can start online at accessorydwellings.org for a list of regulations by state and city.
Read the court decisionRead the full story...Reprinted courtesy of
Cynthia Flash, Bloomberg
Ninth Circuit Finds No Coverage for Construction Defects Under California Law
April 05, 2017 —
Tred R. Eyerly – Insurance Law HawaiiThe Ninth Circuit, applying California law, affirmed the district court's decision finding there was no coverage for construction defects. Archer W. Contractors v. Nat'l Union Fire Ins. Co., 2017 U.S. App. LEXIS 3796 (9th Cir. March 2, 2017).
Archer Western Contractors (AWC) was the general contractor for the San Diego County Water Authority's emergency water storage project. The pump house and turbine generators suffered property damage. The damage flowed from AWC's allegedly defective work on the property.
After settling a construction defect lawsuit brought against it by the Water Authority, AWC filed this case against National Union for failing to indemnity portions of the settlement agreement.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Insurance Law HawaiiMr. Eyerly may be contacted at
te@hawaiilawyer.com
Architect Named Grand Custom Home Winner for Triangular Design
November 05, 2014 —
Beverley BevenFlorez-CDJ STAFFRobert Gurney, architect, created a triangular shaped home design to deal with restricted space on a corner lot that has "stumped developers for years," according to Custom Home.
"Using the wedge-shaped lot’s height limit and property line setbacks to define a structure, Gurney designed a striking triangle-plan house that not only answers its owners’ program requirements, but also makes a handsome and respectful addition to the existing streetscape," according to Custom Home.
Gurney told Custom Home that the clients--two graphic designers--helped make it successful. “They’re design-oriented,” he said, “so they were pretty much on board with whatever we came up with. And, fortunately, they didn’t need a lot of space; they’re empty-nesters.”
Read the court decisionRead the full story...Reprinted courtesy of
The Increasing Trend of Caps in Construction Contracts and Negotiating Them
November 27, 2023 —
Jarred Trauth - ConsensusDocsRisks are inherent in every construction project and all parties involved face them: owners, designers, general contractors/builders, subcontractors, suppliers…. Equitably allocating such risks is one of the most important and most negotiated areas of any construction related contract. Limitations of liability provisions are key to risk allocation. These provisions include no damage for delay provisions and caps on delay damages, warranty limitations and exclusions, indemnity limitations, and consequential damage waivers. Another, and the focus of this article, is a liability cap fixing the total amount of damages for which a party may be liable under the contract (the “Liability Cap”). Liability Caps have become more and more common in construction and construction related contracts, including major component supply agreements and design agreements.
This article will discuss Liability Caps generally and considerations of an owner or contractor negotiating them, including carve-outs (i.e. exceptions) to them.
Read the court decisionRead the full story...Reprinted courtesy of
Jarred Trauth, Jones Walker LLPMr. Trauth may be contacted at
jtrauth@joneswalker.com
Ninth Circuit: Speculative Injuries Do Not Confer Article III Standing
February 28, 2018 —
Omar Parra and Lawrence S. Zucker II – Publications & InsightsAs Dwight Schrute of hit NBC show “The Office” said, “identity theft is not a joke, Jim! Millions of families suffer every year!” In response, Congress has passed a variety of legislation over the years aimed at curbing identity theft. One such piece of legislation, the Fair Credit Reporting Act (“FCRA”), as amended by corollary acts, prohibits the printing of more than the last 5 digits of the credit card number or the credit card number’s expiration date on any sales receipt. Anyone who “willfully fails to comply with [the requirements] is liable to that consumer” for statutory or actual damages, attorney’s fees and costs, and potential punitive damages. But is a statutory violation of the FCRA alone a sufficient injury to confer Article III standing? No, says the Ninth Circuit.
Reprinted courtesy of
Omar Parra, Haight, Brown & Bonesteel LLP and
Lawrence S. Zucker II , Haight, Brown & Bonesteel LLP
Mr. Parra may be contacted at oparra@hbblaw.com
Mr. Zucker may be contacted at lzucker@hbblaw.com
Read the court decisionRead the full story...Reprinted courtesy of