Business Risk Exclusions (j) 5 and (j) 6 Found Ambiguous
April 22, 2019 —
Tred R. Eyerly - Insurance Law HawaiiReversing the district court's grant of summary judgment in favor of the insurer, the Tenth Circuit found that exclusions (j) 5 and (j) 6 were ambiguous as applied to the facts of the case. MTI, Inc. v. Emplrs. Ins. Co., 2019 U.S. App. LEXIS 2543 (10th Cir. Jan. 25, 2019).
Western Farmers Electrical Cooperative (WFEC) owned cooling towers which were serviced by MTI, Inc. Wausau provided a CGL policy to MTI.
In 2011, MTI found that anchor bolts in Cooling Tower 1 were corroded. WFEC hired MTI to make repairs by installing new anchor castings with anchor bolts and anchor adhesive.
On May 23, 2011, MTI employees removed all of the corroded anchor bolts in Tower 1. Because the adhesive applicator had not yet arrived, MTI did not immediately install new anchor bolts. On the night of May 24, strong winds struck the tower, causing it to lean and several structural components broke. Due to the extent of the structural damage, removal and replacement of the tower was determined to be the only viable option.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Damon Key Leong Kupchak HastertMr. Eyerly may be contacted at
te@hawaiilawyer.com
Eleventh Circuit Rules That Insurer Must Defend Contractor Despite “Your Work” Exclusion, Where Damage Timing Unclear
May 13, 2019 —
Michael S. Levine & David M. Costello - Hunton Andrews KurthThe Eleventh Circuit has reversed an insurer’s award of summary judgment after finding that uncertainty about when the alleged property damage occurred raised questions about whether the damage came within the scope of the “Your Work” exclusion. More specifically, the court found unclear whether the damage occurred before or after the contractor abandoned the job, thereby triggering an exception to the “Your Work” exclusion for damage to work that had “not yet been completed or abandoned.” The decision illustrates how timing can be a critical factor when it comes to triggering coverage for work and completed operations.
In Southern-Owners Insurance Company v. MAC Contractors of Florida, LLC, a pair of trustees hired MAC Contractors (doing business as KJIMS Construction) to serve as the general contractor for a custom residence. After construction began, disputes between the trustees and KJIMS caused the contractor to abandon the job before completing the project. The trustees followed with a lawsuit alleging, among other things, that KJIMS had damaged wood floors and a metal roof, which KJIMS had promised to remediate but never did.
Reprinted courtesy of
Michael S. Levine, Hunton Andrews Kurth and
David Costello, Hunton Andrews Kurth
Mr. Levine may be contacted at mlevine@HuntonAK.com
Mr. Costello may be contacted at dcostello@HuntonAK.com
Read the court decisionRead the full story...Reprinted courtesy of
Cooperation and Collaboration With Government May Be on the Horizon
September 17, 2018 —
Pillsbury's Construction & Real Estate Law Team - Gravel2GavelIn Is the Pendulum Swinging on Agency and Government Contractor Cooperation?, Pillsbury attorneys Mike Rizzo, Glenn Sweatt and Kevin Massoudi discuss comments from the Department of Defense as well as recent good faith and fair dealing court decisions that point to and encourage improved contractor/government relationships. Their key takeaways include
- Government officials are actively encouraging collaboration with, and less antagonism of, industry contractors.
Read the court decisionRead the full story...Reprinted courtesy of
Pillsbury's Construction & Real Estate Law Team
If Passed, New Bill AB 2320 Will Mandate Cyber Insurance For State Government Contractors
September 07, 2020 —
Makenna Miller & Jeffrey Dennis - Newmeyer DillionEarlier this year, Assemblyman Edwin Chau (D-Monterey Park) introduced Assembly Bill 2320. AB 2320, if passed, would require any business that contracts with the state and has access to records containing personal information protected under the state’s Information Practices Act (IPA) to maintain cyber insurance coverage. Information covered under the IPA includes names, social security numbers, physical descriptions, home addresses, home telephone numbers, education, financial matters, and medical or employment history. Requiring contractors to maintain cyber insurance will likely both shift the costs of cyberattacks from taxpayers to the private sector, while also encouraging robust cyber security practices among businesses of all sizes. While the bill has not yet passed, businesses will be best served by implementing and improving cybersecurity practices now in order to attain lowest premium rates in the future.
Incentivizing Best Practices
With the adoption of AB 2320, businesses will be incentivized to increase their security posture in order to receive lower premiums from insurers. Simultaneously, insurers will be incentivized to mandate best practices from their insureds in order to mitigate their risk of having to pay out on cyber insurance policies. Thus, cyber insurance will work as a vehicle to increase best practices in businesses and subsequently decrease vulnerabilities to cyberattacks.
Reprinted courtesy of
Makenna Miller, Newmeyer Dillion and
Jeffrey Dennis, Newmeyer Dillion
Ms. Miller may be contacted at makenna.miller@ndlf.com
Mr. Dennis may be contacted at jeff.dennis@ndlf.com
Read the court decisionRead the full story...Reprinted courtesy of
Force Majeure Recommendations
August 15, 2022 —
Denise Motta - Gordon & Rees Construction Law BlogThis Bulletin provides guidance to contractors, subcontractors, suppliers, and others to ensure compliance with contractual change order requirements in the event work on a construction project is impacted by a force majeure event.
Contract Protection Tips:
A force majeure event is defined as an unforeseeable circumstance that prevents someone from fulfilling a contract. Because many events arising on a construction project could be arguably unforeseen, it is imperative that the contract contain a Force Majeure provision. Examine all contracts for the applicable Force Majeure provision. Look for a clause like this:
§ 8.3.3 Any failure or omission by Owner or Contractor in performance of its obligation shall not be deemed a breach or create any liability for damages or other relief (other than additional time) if it arises from any cause beyond the reasonable control of such party, including, without limitation, acts of God, floods, fire, explosions, storms, earthquakes, acts of public enemy, war, terrorism, rebellion, insurrection, riot, sabotage, invasion, epidemic, quarantine, strikes, lockouts, labor disputes or other industrial disturbances, or any order or action by any governmental agency, or causes of similar nature.
Read the court decisionRead the full story...Reprinted courtesy of
Denise Motta, Gordon Rees Scully Mansukhani, LLPMs. Motta may be contacted at
dmotta@grsm.com
Chinese Billionaire Developer Convicted in UN Bribery Case
August 02, 2017 —
Bob Van Voris - BloombergA Chinese developer was convicted of charges he paid bribes to win backing for a United Nations conference center that he hoped to build in Macau.
A jury in Manhattan on Thursday found the developer, billionaire Ng Lap Seng, guilty of all six charges he faced, including conspiracy, bribery and money laundering, in the biggest UN corruption scandal since the oil-for-food program in the early 2000s. Prosecutors claimed Ng funneled hundreds of thousands of dollars to former UN General Assembly President John Ashe and other officials.
Read the court decisionRead the full story...Reprinted courtesy of
Bob Van Voris, Bloomberg
The "Dark Overlord" Strikes The Practice Of Law: What Law Firms Can Do To Protect Themselves
April 17, 2019 —
Ivo G. Danielle – Newmeyer & DillionCybersecurity breaches involving law firms are on the rise with each passing year. Law firms are prime targets for cyber criminals seeking confidential and sensitive information because of the various types of legal work that law firms normally handle for their clients. Whether it be mergers and acquisitions, the use of intellectual property, purchase agreements, bankruptcy or even litigation involving divorce, law firms are a rich depository for highly confidential and sensitive information. As a result, law firms must employ comprehensive security measures to protect themselves from security breaches or risk being on the losing end of a costly malpractice claim, and suffer severe reputational harm.
Law Firms Continue To Be Targeted By Cybercriminals
According to the American Bar Association ("ABA") 2018 Legal Technology Survey Report, 23% of the law firms who participated in the survey reported that their law firm experienced a data breach. Although this may be just a 1% increase from the 22% who reported a breach in 2017, it is important to understand that this is an increase of 8% from the stable percentages reported from 2013 through 2016.1 The 2018 survey report also revealed that security breaches fluctuated with firm size – 14% for solo law firms, 24% for firms employing 2-9 attorneys, approximately 24% for firms with 10-49 attorneys, 42% for firms with 50-99 attorneys, and approximately 31% for those firms employing 100 or more attorneys.
Latest Law Firm Security Breaches
The notorious criminal group called "The Dark Overlord" has a history of committing data breaches of high profile companies such as Gorilla Glue, Netflix, Larson Studios, multiple healthcare companies, and Little Red Door Cancer Agency. Their goal is simple – steal sensitive information and then extort payment from the victims by threatening to release the sensitive information to the public.
On December 31, 2018, this cybercriminal group announced to the world that they had acquired 18,000 documents containing highly sensitive legal information related to insurance based litigation connected to the 9/11 tragedy. The stolen information was the attorney/client property of Lloyd's of London, Silverstein Properties, and Hiscox Syndicates, Ltd. In its announcement, The Dark Overlord boasted that they were in possession of client sensitive information, such as: "emails; retainer agreements; non-disclosure agreements; settlements, litigation strategies; liability analysis; defense formation; collection of expert witness testimonies; communication with government officials in countries all over the world; voice mails; dealings with the FBI, USDOJ, DOD, confidential communications, and so much more."
Subsequent to the data breach, The Dark Overlord announced to the public that they designed a compensation plan that would allow for public crowd-funding for its organization to permit the public to view the stolen information in exchange for bitcoin payment. The more public funding it receives, the more stolen sensitive information will be unlocked and released to the public. It is estimated that this cybercriminal group already distributed information to the public on two separate occasions during the month of January 2019.
High profile cybersecurity breaches of law firms is nothing new – for example, the infamous Panama Papers breach, where cybercriminals leaked 11.5 million documents exposing the shadowy business of setting up offshore corporations as tax shelters for businesses, celebrities, and politicians - and the infamous Petya Malware attack which resulted in a digital lockdown of one of the world's largest law firms, DLA Piper. However, despite the infrequency of publicized cyber-attacks of law firms by the media, the FBI has recently announced that law firms should expect an increase in security attacks by cybercriminals because law firms are now viewed as "one-stop shops" for cybercriminals. Therefore, in order to combat the inevitable increase in cyber-attacks, law firms must get prepared.
How Law Firms Can Protect Themselves
All law firms will agree that the most serious consequence of a security breach for their firm would be the unauthorized access to sensitive client data. The American Bar Association's Model Rules of Professional Conduct, specifically Rules 1.1 and 1.62 and related Comments, require an attorney to take competent and reasonable measures to safeguard information relating to their clients. This duty to "safeguard' information imposes a significant challenge to firms when using technology in connection with protecting client information because most law firms are not savvy with technology and lack proper cyber security training.
In order for a law firm to protect itself from security breaches and inadvertently violate its duty of safeguarding a client's sensitive information, it is important to take the following actions:
- Start by taking an inventory and risk assessment of the firm to determine what needs to be protected – the inventory should include both technology and data;
- Develop, implement and maintain an appropriate cybersecurity program that complies with applicable ethical and legal obligations;
- Ensure the cybersecurity program addresses people, policies and procedures, and technology. The cybersecurity program must designate an individual or a group to be in charge and coordinate security;
- Develop an incident response plan scaled to the size of the firm;
- Continually train staff and attorneys to identify and understand potential cybersecurity threats;
- Consider implementing a third-party assessment of firm's cybersecurity program and policies;
- Purchase cyber liability for insurance which not only covers first party losses to law firms (like lost productivity, data restoration, and legal expenses) but also liability protection to third parties;
- Implement authentication and access controls for network, computers and mobile devices used by the firm's staff and attorneys;
- Consider the use of full-drive encryption for computers and mobile devices;
- Have staff and attorneys avoid and/or limit the use of public WiFi when working remotely; and
- Create a disaster recovery plan to backup all data in the event of a cyber-attack or natural catastrophe.
Continually reviewing, implementing, training and updating a firm's cybersecurity program and protocols will help safeguard sensitive and confidential client information and/or data. No law firm wants to be the next data breach headline – so take the necessary steps to avoid a potential disaster.
1 Past ABA Legal Technology Surveys reported 14% in 2016, 15% in 2015, 14% in 2014 and 15% in 2013.
2 On November 1, 2018, California adopted ethics rules patterned after the ABA Model Rules of Professional Conduct.
Ivo Daniele is a seasoned associate in Newmeyer & Dillion's Walnut Creek office. His practice includes representing private and public companies with both their transactional and litigation needs. You can reach Ivo at ivo.daniele@ndlf.com.
About Newmeyer & Dillion
For almost 35 years, Newmeyer & Dillion has delivered creative and outstanding legal solutions and trial results for a wide array of clients. With over 70 attorneys practicing in all aspects of business law, privacy & data security, employment, real estate, construction, insurance law and trial work, Newmeyer & Dillion delivers legal services tailored to meet each client's needs. Headquartered in Newport Beach, California, with offices in Walnut Creek, California and Las Vegas, Nevada, Newmeyer & Dillion attorneys are recognized by The Best Lawyers in America©, and Super Lawyers as top tier and some of the best lawyers in California, and have been given Martindale-Hubbell Peer Review's AV Preeminent® highest rating. For additional information, call 949.854.7000 or visit www.ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of
Contingent Business Interruption Claim Denied
April 08, 2014 —
Tred R. Eyerly – Insurance Law HawaiiThe insured's claim for contingent business interruption ("CBI") coverage was denied in Millennium Inorganic Chemicals Ltd. v. Nat. Union Fire Ins. Co. of Pittsburgh Pa., 2014 U.S. App. LEXIS 3096 (4th Cir. Feb. 20, 2014).
Millenium processed titanium dioxide, a compound used for its white pigmentation, at its plant in Western Australia. Millennium purchased natural gas to process the titanium dioxide from Alinta Sales Pty Ltd., a natural gas supplier. Alinta purchased gas from Apache Corporation. Once Apache processed the natural gas, it was injected into a pipeline. The gas from Apache's facility was commingled with that obtained from other producers, resulting in a mix of gas in a single pipeline.
Alinta had sole ownership of the gas once it entered the pipeline. Under Alinta's contract with Millennium, title to the gas passed to Millenium only at the time of delivery, i.e., when the gas left the pipeline and was delivered to Millennium's facility through a separate delivery line. Millennium had no contract or business relationship with Apache, and the contract it had with Alinta made no reference to Apache.
An explosion occurred at Apache's facility causing its natural gas production to cease. As a result, Millennium's gas supply was curtailed, and it was force to shut down its operations for a number of months.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Insurance Law HawaiiMr. Eyerly may be contacted at
te@hawaiilawyer.com