Private Mediations Do Not Toll The Five-Year Prosecution Statute
April 28, 2016 —
Zachary P. Marks – Chapman Glucksman Dean Roeb & Barger In FocusIf you thought private mediation could toll the five-year period for case prosecution – think again. In a recent decision handed down by the Second District Court of Appeal, the court unequivocally held that voluntary, private mediations do not toll the five-year period before dismissal for failure to bring an action to trial.
California Code of Civil Procedure section 583.310 sets forth the applicable rule: “[a]n action shall be brought to trial within five years after the action is commenced against the defendant.” Section 1775.7(b) clarifies this rule, stating that the five-year period can be tolled if it is “submitted to mediation” within the final six months of the five-year period. However, the Code is silent with respect to the effect of tolling on public versus private mediations.
The Court of Appeal addressed this issue in its recent decision entitled Castillo v. DHL Express (USA) (2015) 243 Cal.App.4th 1186. Castillo was an employment class action brought by truck drivers against their employers. Plaintiffs argued that the case was “submitted to mediation” within the meaning of Section 1775.7(b) because the court’s Case Management Order reflected the fact that the parties agreed to pursue mediation. Conversely, defendants argued that the Case Management Statement clearly stated that the parties voluntarily agreed to a private mediation, not a court-ordered mediation.
Read the court decisionRead the full story...Reprinted courtesy of
Zachary P. Marks, Chapman Glucksman Dean Roeb & Barger In FocusMr. Marks may be contacted at
zmarks@cgdrblaw.com
Construction Continues To Boom Across The South
September 09, 2019 —
Louise Poirier - Engineering News-RecordContractors reported revenue growth of $2 billion in 2018 and are optimistic heading into the second half of 2019. The looming threat of a downturn, though, weighs heavy on some industry leaders’ minds as does the constant threat of workforce shortages.
Reprinted courtesy of
Louise Poirier, Engineering News-Record
Ms. Poirier may be contacted at poirierl@enr.com
Read the court decisionRead the full story...Reprinted courtesy of
Philadelphia Revises Realty Transfer Tax Treatment of Acquired Real Estate Companies
January 05, 2017 —
Nancy Frantz, Kevin Koscil & James Vandermark – White and Williams LLPOn December 8, 2016, the Philadelphia City Council voted unanimously to amend the ordinance governing realty transfer taxes in an effort to increase tax revenue. The current combined realty transfer tax rate in Philadelphia is 4.0% and will increase to 4.1% after December 31, 2016.[1] The amendment significantly impacts how taxes are imposed upon transfers of ownership in so-called “real estate companies” and effectively eliminates deals commonly referred to as 89-11 transactions. The amendment mainly focuses on transfers of real estate companies, rather than direct transfers of real estate, but it also affects certain direct transfers of real estate in exchange for noncash consideration.
Reprinted courtesy of White and Williams LLP
Nancy Frantz,
Kevin Koscil and
James Vandermark
Ms. Frantz may be contacted at frantzn@whiteandwilliams.com
Mr. Koscil may be contacted at koscilk@whiteandwilliams.com
Mr. Vandermark may be contacted at vandermarkj@whiteandwilliams.com
Read the court decisionRead the full story...Reprinted courtesy of
Federal Judge Rips Shady Procurement Practices at DRPA
October 07, 2016 —
Wally Zimolong – Supplemental ConditionsIn an opinion overturning a $17,000,000 bridge painting contract for the Commodore Barry Bridge, a United States Federal Judge called the procurement practices of the Delaware River Port Authority “a black box . . . obscure and unexplained, and lacking any indicia of transparency or the hallmarks of a deliberative process.”
The case involved lead paint remediation and repainting of the Pennsylvania span of the Commodore Barry. Seven contractors submitted bids. Alpha Painting was the apparent low bidder. Corcon was the second low bidder. Corcon was also the contractor that was perform the painting work on the New Jersey span of the bridge. Like most agencies engaged in public bidding, the DRPA requires contracts to be awarded to the lowest responsible and responsive bidder.
Read the court decisionRead the full story...Reprinted courtesy of
Wally Zimolong, Zimolong LLCMr. Zimolong may be contacted at
wally@zimolonglaw.com
Construction Litigation Roundup: “You Left Out a Key Ingredient!”
September 12, 2023 —
Daniel Lund III - Lexology“Baking is as much of a science as it is an art. It’s important to take the time to understand what you’re doing and why. Skipping steps can make or break your cupcakes, and there are a lot of things that can go wrong when baking from scratch.”
And so it is with construction contract drafting.
Defendants on a Miller Act claim filed by a second-tier subcontractor in federal court in Pensacola, Florida, sought to have the case transferred to Virginia, based upon a forum selection clause in the first-tier subcontract.
Read the court decisionRead the full story...Reprinted courtesy of
Daniel Lund III, PhelpsMr. Lund may be contacted at
daniel.lund@phelps.com
Constructive Change Directives / Directed Changes
June 06, 2018 —
David Adelstein - Florida Construction Legal Updatesrime contracts typically contain a constructive change directive clause. A constructive change directive also goes by the acronym CCD (and for purposes of this article, such changes will be referred to as a CCD), however it can also be known as a Work Change Directive, Interim Directed Change, or Directed Change, depending on the type of contract beign utilized. An owner can order a CCD, versus issuing the contractor a formalized change order, as a mechanism to direct the prime contractor to perform work if there is a dispute as to contract amount, time, or scope. Just because an owner issues a CCD does not mean the owner is conceding that it owes the contractor a change order. Rather, the owner is ordering the CCD as a mechanism to keep the project moving forward notwithstanding a disagreement with the contractor as to the price or time impact. Standard form construction agreements such as the AIA, EJCDC, or ConsensusDocs, will have a standard provision dealing with change directives where the owner can order the contractor to proceed with work in the absence of a change order. In the federal government context, most construction contracts will contain a changes clause that authorizes the government to formally direct changes; and, there is authority for contractors to equitably pursue a constructive change based on certain directives or instructions issued by the government. Naturally, from the contractor’s perspective, this CCD provision is an important consideration as it could likely require the contractor to finance a change to the owner’s project, particularly if there is a scope dispute where the owner does not believe the contractor is entitled to any change order.
Read the court decisionRead the full story...Reprinted courtesy of
David Adelstein, Florida Construction Legal UpdatesMr. Adelstein may be contacted at
dadelstein@gmail.com
Monumental Museum Makeover Comes In For Landing
May 28, 2024 —
Jim Parsons - Engineering News-RecordAfter more than 40 years of chronicling the nation’s storied exploration of the sky and heavens, the Smithsonian Institution’s National Air and Space Museum in Washington, D.C., was, in a word, tired.
Reprinted courtesy of
Jim Parsons, Engineering News-Record
ENR may be contacted at enr@enr.com
Read the full story... Read the court decisionRead the full story...Reprinted courtesy of
Builders Beware: Smart Homes Under Attack by “Hide ‘N Seek” Botnet
October 30, 2018 —
Scott L. Satkin & Amtoj S. Randhawa - Newmeyer & Dillion LLPGerman manufacturer eQ-3 has found itself under siege by a botnet known as "Hide 'N Seek." This pernicious malware has infected tens of thousands of eQ-3's smart home devices by compromising the device's central control unit. Once a device has been infected, the malware spreads to other Internet of Things ("IoT") devices connected to the same wireless network. IoT devices have become the prime target for botnet attacks. As opposed to computers, laptops, or other larger computing devices, the smaller storage capacity and lower processing power of IoT devices limit the amount and complexity of the security measures that can be installed—making them an easier target for botnets.
What is a Botnet?
For those unfamiliar with the term, a botnet is a network of devices infected with a malware program allowing the infector to control and/or exploit the devices. Once a suitable number of devices are infected, the person or group controlling the botnet can harness the computing power of each infected device to perform activities which were previously constrained by a single device's capabilities (i.e. DDoS attacks, spamming, cryptocurrency mining, etc.).
Hide 'N Seek – History and Capabilities
The Hide 'N Seek botnet first appeared in January 2018 and has since spread rapidly. Its sophisticated design and capabilities have captivated the attention of many security watchdogs and researchers. While many botnets are designed to be "quick and dirty" (i.e. infect a few devices, eke out a little profit, and inevitably be cleared out or rendered ineffective by security updates and fixes), Hide 'N Seek was designed to maintain itself in the host's system indefinitely. When it was first released, Hide 'N Seek primarily targeted certain routers and internet-enabled security cameras; however, it has now began targeting digital video recorders, database servers, and most recently, smart home hubs.
Hide 'N Seek's communication capabilities are also more advanced than previous botnets. Previous botnets relied on existing communications protocols to communicate with other another, but Hide 'N Seek uses a custom-built peer-to-peer system to communicate. This advancement allows Hide 'N Seek to spread more rapidly than previous botnets.
Hide 'N Seek is also capable of extracting a device owner's personal information (i.e. name, address, e-mail, telephone numbers, etc.) whereas previous botnets were not. Most importantly, Hide 'N Seek is consistently updated to increase its infection rate, decrease its detection probability, and bypass any security measures designed to detect and remove it from the system. This modularity has proved to be Hide 'N Seek's greatest strength.
Protecting Against Hide 'N Seek and Other Botnets
While many of the precautions will undoubtedly come from the device manufactures vis-à-vis software programming and updates, homebuilders can still take some precautions to protect their customers.
- When selecting a smart home system to incorporate into a home's construction, be sure to evaluate its security features including, but not limited to its: wireless connectivity, password/passphrase requirements, interconnectedness with other IoT devices, etc. Third-party reviews from tech-oriented outlets will likely have useful information on a device's security measures, vulnerabilities, and any recent security compromises.
- Be vigilant in installing any eQ-3 smart home systems. The extent of the damage caused by Hide 'N Seek botnet remains unknown, as does damage from other potentially-infected technology. Thus, it may be prudent to avoid installing any eQ-3 device until it becomes evident that the threat has been neutralized and all security vulnerabilities have been remedied.
- If a builder uses technology other than eQ-3, precautions must be taken. Ensure that technology providers are thoroughly researched. It is also recommended to include strong contractual indemnity provisions, and require vendors to carry cyber-specific insurance policies.
- Homebuilders should consider purchasing their own stand alone cyber liability policies as a safety net, should potential exposure arise.
Scott Satkin and Amtoj Randhawa are associates in the Cybersecurity group of Newmeyer & Dillion. Focused on helping clients navigate the legal dispute implications of cybersecurity, they advise businesses on implementing and adopting proactive measures to prevent and neutralize cybersecurity threats. For questions on how they can help, contact Scott at scott.satkin@ndlf.com and Amtoj at amtoj.randhawa@ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of