Arizona – New Discovery Rules
May 16, 2018 —
John Belanger - Bremer Whyte Brown & O'Meara LLPEffective July 1, 2018
New Rules of Civil Procedure are taking effect in Arizona on July 1, 2018. The new Rules will change how discovery works in civil litigation in the state. Here is a sneak peek at the changes that will impact your file handling the most:
Tiered Discovery
- How much discovery is allowed in a case will now depend on the amount and type of relief sought
- Cases will be assigned to one of three tiers
- Parties can agree on a tier assignment, the court can assign a tier, or a tier can be assigned based on the amount of damages, or a combination of monetary and non-monetary damages
Read the court decisionRead the full story...Reprinted courtesy of
John Belanger, Bremer Whyte Brown & O'Meara LLPMr. Belanger may be contacted at
jbelanger@bremerwhyte.com
Texas “Loser Pays” Law May Benefit Construction Insurers
June 07, 2011 —
CDJ STAFFUnder a new law, Texas HB 274, the Texas Supreme Court will be making rules for motions to dismiss and to expedite suits of less than $100,000. The law also contains two “loser pays” provisions. If a lawsuit is found dismissed for having “no basis in fact or law,” the losing side must pay attorney costs. The other provision caps award of attorney fees if plaintiffs reject settlement offers. Texas Lawyer quotes Houston attorney Mike Gallagher as saying this will affect “the practice of everyone who handles significant lawsuits.”
Gregory Marcum, whose practice includes construction defect litigation, plans to contact insurance companies, as the new law may save them money. “It will definitely be a factor in the defense strategy for handling a case.” He notes that “any insurance carrier would want that done.”
Marcum notes that the offer-of-settlement rules only apply when cases go to trial. “Almost all cases settle.”
Read HB 274
Read the full story…
Read the court decisionRead the full story...Reprinted courtesy of
Consider Short-Term Lease Workouts For Commercial Tenants
August 17, 2020 —
Steven Ostrow, C. Jason Kim & Patrick Haggerty - White and WilliamsThe COVID-19 pandemic is adversely affecting commercial real estate as it continues to wreak havoc in industries throughout the economy. For many years, the primary declining CRE sector has been brick and mortar retail stores. However, the retail sector is no longer suffering alone, as the COVID-19 outbreak is hurting most other CRE sectors: office, hospitality, multifamily, restaurant, personal services, entertainment and construction.
Federal, state and local governments have ordered business shutdowns and social and travel restrictions limiting most social and commercial activities. As a result, commercial tenants throughout the country are going out of business, temporarily closing, curtailing operations, laying off employees and suffering sharply declining revenues.
Short-Term Leasing Workouts of Tenant Defaults
Thousands of tenants are partially operating or temporarily closed and lack sufficient cash flow or access to additional working capital to pay some or all of their rent. How should a landlord address a distressed tenant's default and request for rent relief, taking into account the landlord's own responsibilities to pay maintenance costs, real estate taxes and debt service on the property?
Reprinted courtesy of White and Williams attorneys
Steven Ostrow,
C. Jason Kim and
Patrick Haggerty
Mr. Ostrow may be contacted at ostrows@whiteandwilliams.com
Mr. Kim may be contacted at kimcj@whiteandwilliams.com
Mr. Haggerty may be contacted at haggertyp@whiteandwilliams.com
Read the court decisionRead the full story...Reprinted courtesy of
And the Cyber-Beat Goes On. Yet Another Cyber Regulatory Focus for Insurers
April 15, 2015 —
Robert Ansehl – White and Williams LLPRegulators and government agencies are sharpening their focus on the issues surrounding cyber risk. The number of pronouncements are too numerous to recite in a single client alert but the overarching message is clear – be prepared or be subject to attack. Attacks not only will come from hackers, customers, consumers and, ultimately the plaintiffs’ bar, but the regulators themselves. Vulnerability lies not only with cyber attacked companies but increasingly with the companies’ officers and directors who fail to adequately safeguard data.
On March 26, 2015, the New York Department of Financial Services (DFS) announced that it would be expanding its information technology examination procedures to focus on cyber risk. This effort was a follow-up to its February 8, 2015 announcement of new cyber assessments (See "Not Just Another Client Alert about Cyber-Risk and Effective Cybersecurity Insurance Regulatory Guidance," March 24, 2015). Not to be outdone, the National Association of Insurance Commissioners (NAIC) proposed a comprehensive and mandatory filing for property casualty insurers that would give regulators a full range of information and data on cyber risk exposures issued by carriers in the insurance market. This proposal comes on the heels of President Obama’s proposal, just two months ago, to create the Cyber Threat Intelligent Integration Center (CTIIC), a new federal agency designed to fight cyber attacks, provide collaboration and encourage information sharing between the Federal government and private industry.
Read the court decisionRead the full story...Reprinted courtesy of
Robert Ansehl, White and Williams LLPMr. Ansehl may be contacted at
ansehlr@whiteandwilliams.com
California Supreme Court Finds Negligent Supervision Claim Alleges An Occurrence
July 21, 2018 —
Tred R. Eyerly - Insurance Law HawaiiAnswering a question posed by the Ninth Circuit, the California Supreme Court found that a suit against a employer for negligent hiring, retention and supervision of a employee who intentionally injures a third party alleges an occurrence under a CGL policy. Liberty Surplus Co. Corp. v. Ledesma & Meyer Construction Co., 2018 Cal. LEXIS 4063 (Cal. June 4, 2018)
Ledesma & Meyer Construction Company (L&M) contracted with the school district to manage a construction project at a middle school. L&M hired Darold Hecht as an assistant superintendent on the project. In 2010, Jane Doe, a 13-year-old student at the school, sued alleging that Hecht had sexually abused her. Doe’s claims included a cause of action against L&M for negligent hiring, retaining, and supervising Hecht.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Damon Key Leong Kupchak HastertMr. Eyerly may be contacted at
te@hawaiilawyer.com
Builders Beware: Smart Homes Under Attack by “Hide ‘N Seek” Botnet
October 30, 2018 —
Scott L. Satkin & Amtoj S. Randhawa - Newmeyer & Dillion LLPGerman manufacturer eQ-3 has found itself under siege by a botnet known as "Hide 'N Seek." This pernicious malware has infected tens of thousands of eQ-3's smart home devices by compromising the device's central control unit. Once a device has been infected, the malware spreads to other Internet of Things ("IoT") devices connected to the same wireless network. IoT devices have become the prime target for botnet attacks. As opposed to computers, laptops, or other larger computing devices, the smaller storage capacity and lower processing power of IoT devices limit the amount and complexity of the security measures that can be installed—making them an easier target for botnets.
What is a Botnet?
For those unfamiliar with the term, a botnet is a network of devices infected with a malware program allowing the infector to control and/or exploit the devices. Once a suitable number of devices are infected, the person or group controlling the botnet can harness the computing power of each infected device to perform activities which were previously constrained by a single device's capabilities (i.e. DDoS attacks, spamming, cryptocurrency mining, etc.).
Hide 'N Seek – History and Capabilities
The Hide 'N Seek botnet first appeared in January 2018 and has since spread rapidly. Its sophisticated design and capabilities have captivated the attention of many security watchdogs and researchers. While many botnets are designed to be "quick and dirty" (i.e. infect a few devices, eke out a little profit, and inevitably be cleared out or rendered ineffective by security updates and fixes), Hide 'N Seek was designed to maintain itself in the host's system indefinitely. When it was first released, Hide 'N Seek primarily targeted certain routers and internet-enabled security cameras; however, it has now began targeting digital video recorders, database servers, and most recently, smart home hubs.
Hide 'N Seek's communication capabilities are also more advanced than previous botnets. Previous botnets relied on existing communications protocols to communicate with other another, but Hide 'N Seek uses a custom-built peer-to-peer system to communicate. This advancement allows Hide 'N Seek to spread more rapidly than previous botnets.
Hide 'N Seek is also capable of extracting a device owner's personal information (i.e. name, address, e-mail, telephone numbers, etc.) whereas previous botnets were not. Most importantly, Hide 'N Seek is consistently updated to increase its infection rate, decrease its detection probability, and bypass any security measures designed to detect and remove it from the system. This modularity has proved to be Hide 'N Seek's greatest strength.
Protecting Against Hide 'N Seek and Other Botnets
While many of the precautions will undoubtedly come from the device manufactures vis-à-vis software programming and updates, homebuilders can still take some precautions to protect their customers.
- When selecting a smart home system to incorporate into a home's construction, be sure to evaluate its security features including, but not limited to its: wireless connectivity, password/passphrase requirements, interconnectedness with other IoT devices, etc. Third-party reviews from tech-oriented outlets will likely have useful information on a device's security measures, vulnerabilities, and any recent security compromises.
- Be vigilant in installing any eQ-3 smart home systems. The extent of the damage caused by Hide 'N Seek botnet remains unknown, as does damage from other potentially-infected technology. Thus, it may be prudent to avoid installing any eQ-3 device until it becomes evident that the threat has been neutralized and all security vulnerabilities have been remedied.
- If a builder uses technology other than eQ-3, precautions must be taken. Ensure that technology providers are thoroughly researched. It is also recommended to include strong contractual indemnity provisions, and require vendors to carry cyber-specific insurance policies.
- Homebuilders should consider purchasing their own stand alone cyber liability policies as a safety net, should potential exposure arise.
Scott Satkin and Amtoj Randhawa are associates in the Cybersecurity group of Newmeyer & Dillion. Focused on helping clients navigate the legal dispute implications of cybersecurity, they advise businesses on implementing and adopting proactive measures to prevent and neutralize cybersecurity threats. For questions on how they can help, contact Scott at scott.satkin@ndlf.com and Amtoj at amtoj.randhawa@ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of
VOSH Jumps Into the Employee Misclassification Pool
July 30, 2015 —
Christopher G. Hill – Construction Law MusingsThe proper classification of workers by construction companies has been on the radar of the Department of Labor for both the US and Virginia governments for quite a while. While most of the misclassification is innocent and not done to create issues, there have been enough instances of purposeful misclassification of certain workers as independent contractors (thus avoiding workers comp and other payroll expenses) that innocent contractors have born the brunt of these issues through increased payroll costs over those that misclassify (in the form of necessarily higher bids, higher overhead, etc.).
As an additional deterrent to improper classification of workers, the Virginia Department of Labor and Industry has issued guidelines for what will occur in Virginia Department of Safety and Health (VOSH) cases.
Read the court decisionRead the full story...Reprinted courtesy of
Christopher G. Hill, Law Office of Christopher G. Hill, PCMr. Hill may be contacted at
chrisghill@constructionlawva.com
Philadelphia Proposed Best Value Procurement Bill
December 08, 2016 —
Wally Zimolong – Supplemental ConditionsAn opinion piece in today’s Philadelphia Inquirer concerning proposed legislation that would change the way the City of Philadelphia awards public construction projects is causing quite a stir. The article concerns legislation that would allow the City to award public construction contracts based on a “best value” approach rather than the current requirement that the contract be awarded to the lowest responsible and responsive bidder. The author worries that by removing the current objective criteria and replacing it with subjective ones, contracts can be steered to politically favored contractors. The author cites the recent no-bid contract awarded to a law firm run by the friend of Mayor Jim Kenney as an example of the chaos would ensue if this bill was passed.
Considering that the Bill’s sponsor, Bobby Hennon, is under FBI investigation, and some of the Mayor’s biggest supporters are as well, the author has ever right to be concerned. However, article comes up short in explaining what the Bill says and what best value procurement, if adopted, would mean for public construction work in Philadelphia.
First, the Bill that Councilman Hennon is proposing is actually a Bill that would make the best value procurement question a ballot question next November. In other words, the Bill, if passed, would but to a City wide vote the question of whether the City should change it procurement practices to permit the best value approach to be used in addition to the low bid approach that is current used.
Read the court decisionRead the full story...Reprinted courtesy of
Wally Zimolong, Zimolong LLCMr. Zimolong may be contacted at
wally@zimolonglaw.com