Why’d You Have To Say That?
October 09, 2023 —
Daniel Lund III - LexologyA surety seeking collateral from indemnitors filed suit in federal court in Louisiana pursuant to a forum selection clause in the indemnity agreement between the parties.
The indemnitors were being called upon to provide collateral as a result of defaults on two Louisiana Department of Transportation projects. Seeking to move the dispute to Louisiana state court from federal court, the indemnitors filed a forum non conveniens motion.
Among the arguments of the indemnitors removing the case out of federal court was the doctrine of “direct-benefits” estoppel – a policy which “‘holds a non-signatory to a clause in a contract if it “knowingly exploits the agreement” containing the clause.’ In re Lloyd's Reg. N. Am., Inc., 780 F.3d 283, 291 (5th Cir. 2015) (quoting Bridas S.A.P.I.C. v. Gov't of Turkmenistan, 345 F.3d 347, 361-62 (5th Cir. 2003)).”
Read the court decisionRead the full story...Reprinted courtesy of
Daniel Lund III, PhelpsMr. Lund may be contacted at
daniel.lund@phelps.com
Call Me Maybe? . . . Don’t Waive Your Rights Under the Right to Repair Act’s Prelitigation Procedures
March 22, 2017 —
Garret Murai – California Construction Law BlogWe’ve written before about the Right to Repair Act (Civil Code Sections 895 et seq.). The Act, also commonly known as SB 800 after the bill that established it, applies to newly constructed residential units including single-family homes and condominiums (but not condominium conversions) sold after January 1, 2003.
Read the court decisionRead the full story...Reprinted courtesy of
Garret Murai, Wendel Rosen Black & Dean LLPMr. Murai may be contacted at
gmurai@wendel.com
Texas exclusions j(5) and j(6).
April 27, 2011 —
CDCoverage.comIn Evanston Ins. Co. v. D&L Masonry of Lubbock, Inc., No. 07-10-00358-CV (Tex. Ct. App. April 18, 2011), insured masonry subcontractor D&L sued its CGL insurer Evanston to recover costs incurred by D&L for the replacement of window frames damaged by D&L while performing masonry work adjacent to the window frames. The trial court granted summary judgment for D&L.
Read the full story…
Reprinted courtesy of CDCoverage.com
Read the court decisionRead the full story...Reprinted courtesy of
Boyfriend Pleads Guilty in Las Vegas Construction Defect Scam Suicide
November 07, 2012 —
CDJ STAFFOne of the odder twists of the Las Vegas construction defect scandal was the charge that Nancy Quon’s boyfriend helped her in an initial suicide attempt. Quon, implicated by not charged in the case of taking control of homeowner boards in order to profit from construction defect settlements. William Webb was alleged to have bought the drug GBH in order to allow Quon, his girlfriend, to commit suicide. Ms. Quon later overdosed on a combination of alcohol and prescription drugs.
In addition to pleading guilty to the drug charges, Webb also made a plea bargain with prosecutors in which he did not admit guilt in an insurance fraud charge, but acknowledged that prosecutors would likely be successful at obtaining a conviction. Webb will be sentenced February 7 and is expected to receive a sentence of six years imprisonment.
Read the court decisionRead the full story...Reprinted courtesy of
No Duty to Indemnify Where No Duty to Defend
February 08, 2021 —
Tred R. Eyerly - Insurance Law HawaiiThe Montana Supreme Court held that because there was no duty to defend the insureds' intentional acts, the insurer had no duty to defend. Farmers Ins. Exch. v. Wessel, 2020 Mont. LEXIS 2617 (Mont. Dec. 22, 2020).
The insureds' property was accessed by Turk Road. Turk Road was also used by the neighbors to access their land. The insureds asked for permission to snowmobile across the neighbors' property. Permission was denied because the property was in a conservation easement which prohibited motorised used. The insureds' thereafter retaliated by not allowing the neighbors to use Turk Road. The neighbors then purchased an easement from another landowners to construct a new driveway which did not traverse the insureds' property. The insureds built snow berms and gates, felled trees, and created other obstacles to prevent the neighbors from using the new driveway. Physical threats were also made by the insureds.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Damon Key Leong Kupchak HastertMr. Eyerly may be contacted at
te@hawaiilawyer.com
Joint Venture Dispute Over Profits
January 28, 2019 —
David R. Cook, Jr. - Autry, Hall, & Cook, LLPA recent Georgia Court of Appeals case demonstrates the risk of joint ventures failing to carefully define accounting rules in their joint venture agreement. Two trade contractors teamed up to accomplish certain tasks on a job at a wastewater lift station at Fort Gordon. A joint venture agreement provided for an equal split of the profits and losses. Unfortunately, the parties did not define “profit,” and particularly did not define what cost would be deducted in calculating profit. They disputed in particular whether certain large payments to individuals and 15% overhead charges should be deducted in calculating profits.
One party presented the expert testimony of an accountant while the other did not. The party presenting expert testimony asked the court to dismiss the other party’s claim because it was not supported by expert testimony of an accountant. The trial court granted the motion and dismissed the claim.
Read the court decisionRead the full story...Reprinted courtesy of
David R. Cook, Jr., Autry, Hall, & Cook, LLPMr. Cook may be contacted at
cook@ahclaw.com
Trucks looking for Defects Create Social Media Frenzy
July 23, 2014 —
Beverley BevenFlorez-CDJ STAFFAccording to Willits News, slow-moving trucks with cameras attached rolled through Fort Briggs, attracting attention from homeowners in the community. People began mentioning the trucks on social media sites, with questions regarding what the cameras on the trucks were recording.
Osmose Utilities General Manager, Jason Milligan, told Willits News that the trucks were “surveying overhead power poles and lines for PG&E.”
"We're not looking for anything but what's overhead," Mulligan said, according to Willits News. "We find defects or issues with construction ... 20 or 30 feet off the ground, which are safety issues. We don't scan anything down towards people's homes."
Read the court decisionRead the full story...Reprinted courtesy of
Builders Beware: Smart Homes Under Attack by “Hide ‘N Seek” Botnet
October 30, 2018 —
Scott L. Satkin & Amtoj S. Randhawa - Newmeyer & Dillion LLPGerman manufacturer eQ-3 has found itself under siege by a botnet known as "Hide 'N Seek." This pernicious malware has infected tens of thousands of eQ-3's smart home devices by compromising the device's central control unit. Once a device has been infected, the malware spreads to other Internet of Things ("IoT") devices connected to the same wireless network. IoT devices have become the prime target for botnet attacks. As opposed to computers, laptops, or other larger computing devices, the smaller storage capacity and lower processing power of IoT devices limit the amount and complexity of the security measures that can be installed—making them an easier target for botnets.
What is a Botnet?
For those unfamiliar with the term, a botnet is a network of devices infected with a malware program allowing the infector to control and/or exploit the devices. Once a suitable number of devices are infected, the person or group controlling the botnet can harness the computing power of each infected device to perform activities which were previously constrained by a single device's capabilities (i.e. DDoS attacks, spamming, cryptocurrency mining, etc.).
Hide 'N Seek – History and Capabilities
The Hide 'N Seek botnet first appeared in January 2018 and has since spread rapidly. Its sophisticated design and capabilities have captivated the attention of many security watchdogs and researchers. While many botnets are designed to be "quick and dirty" (i.e. infect a few devices, eke out a little profit, and inevitably be cleared out or rendered ineffective by security updates and fixes), Hide 'N Seek was designed to maintain itself in the host's system indefinitely. When it was first released, Hide 'N Seek primarily targeted certain routers and internet-enabled security cameras; however, it has now began targeting digital video recorders, database servers, and most recently, smart home hubs.
Hide 'N Seek's communication capabilities are also more advanced than previous botnets. Previous botnets relied on existing communications protocols to communicate with other another, but Hide 'N Seek uses a custom-built peer-to-peer system to communicate. This advancement allows Hide 'N Seek to spread more rapidly than previous botnets.
Hide 'N Seek is also capable of extracting a device owner's personal information (i.e. name, address, e-mail, telephone numbers, etc.) whereas previous botnets were not. Most importantly, Hide 'N Seek is consistently updated to increase its infection rate, decrease its detection probability, and bypass any security measures designed to detect and remove it from the system. This modularity has proved to be Hide 'N Seek's greatest strength.
Protecting Against Hide 'N Seek and Other Botnets
While many of the precautions will undoubtedly come from the device manufactures vis-à-vis software programming and updates, homebuilders can still take some precautions to protect their customers.
- When selecting a smart home system to incorporate into a home's construction, be sure to evaluate its security features including, but not limited to its: wireless connectivity, password/passphrase requirements, interconnectedness with other IoT devices, etc. Third-party reviews from tech-oriented outlets will likely have useful information on a device's security measures, vulnerabilities, and any recent security compromises.
- Be vigilant in installing any eQ-3 smart home systems. The extent of the damage caused by Hide 'N Seek botnet remains unknown, as does damage from other potentially-infected technology. Thus, it may be prudent to avoid installing any eQ-3 device until it becomes evident that the threat has been neutralized and all security vulnerabilities have been remedied.
- If a builder uses technology other than eQ-3, precautions must be taken. Ensure that technology providers are thoroughly researched. It is also recommended to include strong contractual indemnity provisions, and require vendors to carry cyber-specific insurance policies.
- Homebuilders should consider purchasing their own stand alone cyber liability policies as a safety net, should potential exposure arise.
Scott Satkin and Amtoj Randhawa are associates in the Cybersecurity group of Newmeyer & Dillion. Focused on helping clients navigate the legal dispute implications of cybersecurity, they advise businesses on implementing and adopting proactive measures to prevent and neutralize cybersecurity threats. For questions on how they can help, contact Scott at scott.satkin@ndlf.com and Amtoj at amtoj.randhawa@ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of