Louisiana Court Applies Manifestation Trigger to Affirm Denial of Coverage
June 10, 2015 —
Tred R. Eyerly – Insurance Law HawaiiApplying the manifestation trigger, the Louisiana Court of Appeal affirmed denial of coverage where the property damage manifested after the policy period expired. Landry v. Williamson, 2015 La. App. Unpub. LEXIS 213 (La. Ct. App. May 1, 2015).
On August 28, 2002, the Burkarts purchased a home from the Williamsons. One month later, water started leaking into the home during periods of rainfall. Suit was filed against the contractor, who was insured by Scottsdale. Scottsdale, who was added as a defendant, filed a motion for summary judgment, asserting that it did not insure the developer at the time the alleged property damage occurred. Scottsdale's policy expired on August 1, 2002. The trial court granted Scottsdale's motion, finding coverage under its policy was not triggered because no property damage occurred during the policy period.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Insurance Law HawaiiMr. Eyerly may be contacted at
te@hawaiilawyer.com
Safer Schools Rendered Unsafe Due to Construction Defects
February 10, 2012 —
CDJ STAFFBuilt on a program for safer school buildings, schools in Neenan County, Colorado have been shown to have mild-to-moderate structural problems, rendering some of them unsafe. The Denver Post reports that a third-party review of schools built by the Neenan Company has shown structural issues in all fifteen school buildings.
One school, Meeker Elementary, has been closed as it could collapse under high winds or during an earthquake. Sargent Junior-Senior High School is in use, but there are plans to evacuate the buildings if winds exceed 25 mile per hour. Two schools have roofs that are unable to bear expected loads of snow during the winter.
The Neenan Company says that the school buildings are not up to their standards and is working with the school districts to repair the buildings. Repairs are expected to be complete by August.
Read the full story…
Read the court decisionRead the full story...Reprinted courtesy of
Builders Beware: Smart Homes Under Attack by “Hide ‘N Seek” Botnet
October 30, 2018 —
Scott L. Satkin & Amtoj S. Randhawa - Newmeyer & Dillion LLPGerman manufacturer eQ-3 has found itself under siege by a botnet known as "Hide 'N Seek." This pernicious malware has infected tens of thousands of eQ-3's smart home devices by compromising the device's central control unit. Once a device has been infected, the malware spreads to other Internet of Things ("IoT") devices connected to the same wireless network. IoT devices have become the prime target for botnet attacks. As opposed to computers, laptops, or other larger computing devices, the smaller storage capacity and lower processing power of IoT devices limit the amount and complexity of the security measures that can be installed—making them an easier target for botnets.
What is a Botnet?
For those unfamiliar with the term, a botnet is a network of devices infected with a malware program allowing the infector to control and/or exploit the devices. Once a suitable number of devices are infected, the person or group controlling the botnet can harness the computing power of each infected device to perform activities which were previously constrained by a single device's capabilities (i.e. DDoS attacks, spamming, cryptocurrency mining, etc.).
Hide 'N Seek – History and Capabilities
The Hide 'N Seek botnet first appeared in January 2018 and has since spread rapidly. Its sophisticated design and capabilities have captivated the attention of many security watchdogs and researchers. While many botnets are designed to be "quick and dirty" (i.e. infect a few devices, eke out a little profit, and inevitably be cleared out or rendered ineffective by security updates and fixes), Hide 'N Seek was designed to maintain itself in the host's system indefinitely. When it was first released, Hide 'N Seek primarily targeted certain routers and internet-enabled security cameras; however, it has now began targeting digital video recorders, database servers, and most recently, smart home hubs.
Hide 'N Seek's communication capabilities are also more advanced than previous botnets. Previous botnets relied on existing communications protocols to communicate with other another, but Hide 'N Seek uses a custom-built peer-to-peer system to communicate. This advancement allows Hide 'N Seek to spread more rapidly than previous botnets.
Hide 'N Seek is also capable of extracting a device owner's personal information (i.e. name, address, e-mail, telephone numbers, etc.) whereas previous botnets were not. Most importantly, Hide 'N Seek is consistently updated to increase its infection rate, decrease its detection probability, and bypass any security measures designed to detect and remove it from the system. This modularity has proved to be Hide 'N Seek's greatest strength.
Protecting Against Hide 'N Seek and Other Botnets
While many of the precautions will undoubtedly come from the device manufactures vis-à-vis software programming and updates, homebuilders can still take some precautions to protect their customers.
- When selecting a smart home system to incorporate into a home's construction, be sure to evaluate its security features including, but not limited to its: wireless connectivity, password/passphrase requirements, interconnectedness with other IoT devices, etc. Third-party reviews from tech-oriented outlets will likely have useful information on a device's security measures, vulnerabilities, and any recent security compromises.
- Be vigilant in installing any eQ-3 smart home systems. The extent of the damage caused by Hide 'N Seek botnet remains unknown, as does damage from other potentially-infected technology. Thus, it may be prudent to avoid installing any eQ-3 device until it becomes evident that the threat has been neutralized and all security vulnerabilities have been remedied.
- If a builder uses technology other than eQ-3, precautions must be taken. Ensure that technology providers are thoroughly researched. It is also recommended to include strong contractual indemnity provisions, and require vendors to carry cyber-specific insurance policies.
- Homebuilders should consider purchasing their own stand alone cyber liability policies as a safety net, should potential exposure arise.
Scott Satkin and Amtoj Randhawa are associates in the Cybersecurity group of Newmeyer & Dillion. Focused on helping clients navigate the legal dispute implications of cybersecurity, they advise businesses on implementing and adopting proactive measures to prevent and neutralize cybersecurity threats. For questions on how they can help, contact Scott at scott.satkin@ndlf.com and Amtoj at amtoj.randhawa@ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of
Are You Satisfying WISHA Standards?
October 23, 2018 —
Ceslie Blass - Ahlers Cressman & Sleight PLLC BlogMany general contractors and property management companies hand over project sites to subcontractors and have little, if anything, to do with the construction work that occurs. However, under RCW 49.17, the Washington Industrial Safety and Health Act (WISHA), general contractors and some property management companies/owners are still responsible for workplace safety for the employees of their subcontractors and independent contractors.
The Washington Supreme Court held in Stute v. PBMC that a general contractor could be held liable for injury to a subcontractor’s employee sustained as a result of a WISHA violation.[1] The Stute decision changed the landscape of workplace safety, imposing an expansive, per se liability on general contractors for workplace injuries. Stated differently, general contractors have a specific, non-delegable duty to ensure compliance with WISHA regulations, which extends to all employees on the project site.[2] Washington courts have held that such “expansive liability is justified because ‘a general contractor’s supervisory authority is per se control over the workplace.’”[3] Thus, the non-delegable duty requires general contractors to ensure care is exercised by anyone, even an independent contractor to whom the performance of the duty is entrusted.
Read the court decisionRead the full story...Reprinted courtesy of
Ceslie Blass, Ahlers Cressman & Sleight PLLCMs. Blass may be contacted at
ceslie.blass@acslawyers.com
How Pennsylvania’s Supreme Court Decision Affects Coverage of Faulty Workmanship Claims
March 31, 2014 —
Beverley BevenFlorez-CDJ STAFFDarin J. McMullen of the firm Anderson Kill explained how a recent opinion by the Pennsylvania Supreme Court allows “Pennsylvania policyholders” to “more confidently challenge insurance companies’ denials of faulty workmanship claims.”
The decision in Indalex Inc. v. National Union Fire Ins. Co. of Pittsburgh, PA, 2013 Pa. Super 311 (Dec. 3, 2013) “reverses a nearly decade-long trend of Pennsylvania decisions narrowing the scope of insurance coverage for construction and defect-related claims under commercial general liability insurance policies,” according to McMullen. “Equally important, the Indalex ruling dealt a blow to the insurance industry’s continual efforts to win overbroad expansion of the rulings in Kvaerner Metals Div. of Kvaerner U.S., Inc. v. Commercial Union Ins. Co., Millers Capital Ins. Co. v. Gambone Bros. Dev. Co., and Erie Ins. Exchange v. Abbott Furnace Co., which found that claims of faulty workmanship in some circumstances may not constitute coverage-triggering ‘occurrences.’”
Read the court decisionRead the full story...Reprinted courtesy of
Carbon Sequestration Can Combat Global Warming, Sometimes in Unexpected Ways
April 02, 2024 —
Michael S. McDonough, Robert A. James & Amanda G. Halter - Gravel2Gavel Construction & Real Estate Law BlogWhether by land, by sea or through human innovation, carbon sequestration is likely coming to (or already happening in) a destination near you. As our planet, overdosed on greenhouse gases, battles climate disasters, a logical solution is to simply stop pumping carbon dioxide into the air. Legislation worldwide is aimed at that target, but reducing output alone may not be enough. There are still billions of tons of extra CO2 already in the atmosphere—this crossroads is where sequestration comes into play.
Carbon sequestration is exactly what it sounds like—the storage of CO2. Once carbon is sucked out of the air, or in some cases pulled directly from industrial smokestacks, sequestration can be undertaken in a lot of different ways. Carbon storage happens naturally, when forests and oceans absorb and convert CO2 into organic matter, but carbon dioxide can also be artificially injected into deep underground rock formations (or wells), or in some cases technological approaches repurpose carbon into a resource like concrete, or as a catalyst in a closed-loop industrial system. However it’s accomplished, the point of sequestration is to stabilize carbon and ensure it doesn’t creep back into our atmosphere. Researchers, like those at the United Nations’ Intergovernmental Panel on Climate Change, now say that CO2 removal is vital to keeping global warming to 1.5 degrees Celsius (past that threshold, climate change could reach catastrophic levels). A 2023 University of Oxford study estimated that, currently, about two billion metric tons of carbon dioxide are being removed each year, primarily through land management (i.e., planting trees), and suggested that we need to double that amount to avoid dangerous global warming levels.
Reprinted courtesy of
Michael S. McDonough, Pillsbury,
Robert A. James, Pillsbury and
Amanda G. Halter, Pillsbury
Mr. McDonough may be contacted at michael.mcdonough@pillsburylaw.com
Mr. James may be contacted at rob.james@pillsburylaw.com
Ms. Halter may be contacted at amanda.halter@pillsburylaw.com
Read the court decisionRead the full story...Reprinted courtesy of
New Certification Requirements for Veteran-Owned Small Business Concerns and Service-Disabled Veteran-owned Small Business Concerns Seeking Public Procurement Contracts
March 27, 2023 —
Jennifer Harris, Timothy D. Matheny & Abby Bello Salinas - ConsensusDocsEffective January 1, 2023, Veteran-Owned Small Business Concerns (VOSBs) and Service-Disabled Veteran-Owned Small Business Concerns (SDVOSBs) will be required to obtain Small Business Administration (SBA) certification to participate in any federal government agency VOSB or SDVOSB sole source or set-aside prime contracts. This change originated from a Final Rule (87 FR 73400) published by the SBA on November 29, 2022. As a result of this Final Rule, not only will VOSBs and SDVOSBs be required to re-visit, and in some cases re-apply for various certifications, but these new regulations will also impact joint ventures that rely on their member’s VOSB or SDVOSB status to bid public work.
New Regulation
Previously, a VOSB and SDVOSB could self-certify to perform set-aside and sole source projects on non-U.S. Department of Veteran Affairs (VA) procurements—a VOSB and SDVOSB only needed to be certified by the VA Center for Verification and Evaluation (CVE) when bidding on VA procurements contingent on its status.
Reprinted courtesy of
Jennifer Harris, Peckar & Abramson, P.C.,
Timothy D. Matheny, Peckar & Abramson, P.C. and Abby Bello Salinas, Law Clerk, Peckar & Abramson, P.C.
Ms. Harris may be contacted at jharris@pecklaw.com
Mr. Matheny may be contacted at tmatheny@pecklaw.com
Read the court decisionRead the full story...Reprinted courtesy of
Chattanooga Bridge Collapse Likely Resulted From Impact
April 17, 2019 —
Jim Parsons - Engineering News-RecordTennessee highway officials believe an impact from a vehicle’s oversized load is likely to blame for the April 1 partial collapse of a ramp structure at the I-75/I-24 interchange in Chattanooga. The impact caused the outer box beam and railing of the 148-ft-long bridge’s nearly 51-ft main span to fall onto an access ramp, injuring a motorist whose vehicle collided with the debris.
Read the court decisionRead the full story...Reprinted courtesy of
Jim Parsons, ENRENR may be contacted at
ENR.com@bnpmedia.com