The EEOC Targets Construction Industry For Heightened Enforcement
May 15, 2023 —
Meghan Douris & Andrew Scroggins - The Construction SeytSeyfarth Synopsis: On January 10, 2023, the Equal Employment Opportunity Commission (EEOC) released for public comment its
draft 2023-2027 Strategic Enforcement Plan (“SEP”)—a document that will guide the Commission’s enforcement priorities for the next five years. The EEOC’s prior Strategic Plan described how it would pursue its enforcement goals. (See our earlier blog on the Strategic Plan
here). The Strategic Enforcement Plan, on the other hand, describes what the EEOC’s enforcement priorities will be. Earlier actions by the EEOC suggested that it might be turning its attention to the construction industry. In the SEP, the EEOC makes its intentions explicit, putting the construction industry—and especially those receiving federal funding—squarely in its sights.
History of the SEP
The EEOC’s
first SEP covered Fiscal Years 2013-2016 (the EEOC’s fiscal years begin on October 1) and identified six broad subject-matter priorities. The EEOC’s
second SEP set the course for enforcement priorities for FY2017-2022. The
latest proposed SEP, published in the Federal Register for comment for the first time, provides notable additional details that put the employer community on notice of the Commission’s intentions for FY2023-2027.[
1]
Reprinted courtesy of
Meghan Douris, Seyfarth and
Andrew Scroggins, Seyfarth
Ms. Douris may be contacted at mdouris@seyfarth.com
Mr. Scroggins may be contacted ascroggins@seyfarth.com
Read the court decisionRead the full story...Reprinted courtesy of
Study Finds Construction Cranes Vulnerable to Hacking
May 20, 2019 —
Jeff Rubenstone - Engineering News-RecordWhen securing a jobsite against malicious hackers, most go to protect computer files, and few look up and worry about the tower cranes. But many cranes—whether tower, mobile or industrial—can be remotely run via radio wireless controllers, a useful feature for when operators need a clearer view of the load from the ground. Unfortunately, these wireless signals are vulnerable to hijacking, according to a study released earlier this year by security research firm Trend Micro. It found that the radio signals these crane controllers use are not encrypted over the air in any way, and can be easily intercepted and spoofed using off-the-shelf equipment and a basic knowledge of electronics and radio engineering.
Read the court decisionRead the full story...Reprinted courtesy of
Jeff Rubenstone, ENRMr. Rubenstone may be contacted at
rubenstonej@enr.com
Amazon’s Fatal Warehouse Collapse Is Being Investigated by OSHA
December 13, 2021 —
Josh Eidelson & Spencer Soper - BloombergThe Occupational Safety and Health Administration has opened an investigation into the collapse of an Amazon.com Inc. warehouse, according to a Labor Department spokesperson.
A tornado struck the Amazon delivery station in Edwardsville, Illinois, on Friday, killing six workers and destroying much of the facility at the peak of the holiday shopping season.
“OSHA has had compliance officers at the complex since Saturday, Dec. 11, to provide assistance,” the spokesperson said. “OSHA has six months to complete its investigation, issue citations and propose monetary penalties if violations of workplace safety and or health regulations are found.”
Reprinted courtesy of
Josh Eidelson, Bloomberg and
Spencer Soper, Bloomberg Read the court decisionRead the full story...Reprinted courtesy of
New Jersey Courts Speed Up Sandy Litigation
September 03, 2014 —
Beverley BevenFlorez-CDJ STAFFIn order to deal with the thousand plus property damage cases related to Hurricane Sandy the “U.S. District Chief Judge Jerome Simandle of the District of New Jersey, who sits in Camden, N.J., issued a standing order dated Aug. 13 that, in effect, cuts in half the amount of time that arbitrators and mediators will have to hear disputes over coverage and issue rulings,” the New Jersey Law Journal reported.
“John O’Brien, chief deputy of operations for New Jersey’s federal courts, said that, as of Wednesday, 1,240 Sandy-related lawsuits had been filed in New Jersey and that 1,051 of those cases are still pending,” according to the New Jersey Law Journal. “Sixty of those pending cases have been referred to mediation and another six have been sent to arbitration panels, according to O’Brien.”
Read the court decisionRead the full story...Reprinted courtesy of
Builders Beware: Smart Homes Under Attack by “Hide ‘N Seek” Botnet
October 30, 2018 —
Scott L. Satkin & Amtoj S. Randhawa - Newmeyer & Dillion LLPGerman manufacturer eQ-3 has found itself under siege by a botnet known as "Hide 'N Seek." This pernicious malware has infected tens of thousands of eQ-3's smart home devices by compromising the device's central control unit. Once a device has been infected, the malware spreads to other Internet of Things ("IoT") devices connected to the same wireless network. IoT devices have become the prime target for botnet attacks. As opposed to computers, laptops, or other larger computing devices, the smaller storage capacity and lower processing power of IoT devices limit the amount and complexity of the security measures that can be installed—making them an easier target for botnets.
What is a Botnet?
For those unfamiliar with the term, a botnet is a network of devices infected with a malware program allowing the infector to control and/or exploit the devices. Once a suitable number of devices are infected, the person or group controlling the botnet can harness the computing power of each infected device to perform activities which were previously constrained by a single device's capabilities (i.e. DDoS attacks, spamming, cryptocurrency mining, etc.).
Hide 'N Seek – History and Capabilities
The Hide 'N Seek botnet first appeared in January 2018 and has since spread rapidly. Its sophisticated design and capabilities have captivated the attention of many security watchdogs and researchers. While many botnets are designed to be "quick and dirty" (i.e. infect a few devices, eke out a little profit, and inevitably be cleared out or rendered ineffective by security updates and fixes), Hide 'N Seek was designed to maintain itself in the host's system indefinitely. When it was first released, Hide 'N Seek primarily targeted certain routers and internet-enabled security cameras; however, it has now began targeting digital video recorders, database servers, and most recently, smart home hubs.
Hide 'N Seek's communication capabilities are also more advanced than previous botnets. Previous botnets relied on existing communications protocols to communicate with other another, but Hide 'N Seek uses a custom-built peer-to-peer system to communicate. This advancement allows Hide 'N Seek to spread more rapidly than previous botnets.
Hide 'N Seek is also capable of extracting a device owner's personal information (i.e. name, address, e-mail, telephone numbers, etc.) whereas previous botnets were not. Most importantly, Hide 'N Seek is consistently updated to increase its infection rate, decrease its detection probability, and bypass any security measures designed to detect and remove it from the system. This modularity has proved to be Hide 'N Seek's greatest strength.
Protecting Against Hide 'N Seek and Other Botnets
While many of the precautions will undoubtedly come from the device manufactures vis-à-vis software programming and updates, homebuilders can still take some precautions to protect their customers.
- When selecting a smart home system to incorporate into a home's construction, be sure to evaluate its security features including, but not limited to its: wireless connectivity, password/passphrase requirements, interconnectedness with other IoT devices, etc. Third-party reviews from tech-oriented outlets will likely have useful information on a device's security measures, vulnerabilities, and any recent security compromises.
- Be vigilant in installing any eQ-3 smart home systems. The extent of the damage caused by Hide 'N Seek botnet remains unknown, as does damage from other potentially-infected technology. Thus, it may be prudent to avoid installing any eQ-3 device until it becomes evident that the threat has been neutralized and all security vulnerabilities have been remedied.
- If a builder uses technology other than eQ-3, precautions must be taken. Ensure that technology providers are thoroughly researched. It is also recommended to include strong contractual indemnity provisions, and require vendors to carry cyber-specific insurance policies.
- Homebuilders should consider purchasing their own stand alone cyber liability policies as a safety net, should potential exposure arise.
Scott Satkin and Amtoj Randhawa are associates in the Cybersecurity group of Newmeyer & Dillion. Focused on helping clients navigate the legal dispute implications of cybersecurity, they advise businesses on implementing and adopting proactive measures to prevent and neutralize cybersecurity threats. For questions on how they can help, contact Scott at scott.satkin@ndlf.com and Amtoj at amtoj.randhawa@ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of
No Third-Quarter Gain for Construction
November 18, 2011 —
CDJ STAFFThe Associated Builders and Contractors released their analysis of construction work under contract and found that there was no increase in construction backlog from the second quarter of 2011. There was still improvement, however, over 2010, as the third quarter backlog is 16.3 percent higher than that of a year ago.
The current backlog is 8.1 months, which according to Anirban Basu, the chief economist of the ABC, “is consistent with flat construction spending.” He noted that less than 8 months indicated a decline.
Read the full story…
Read the court decisionRead the full story...Reprinted courtesy of
Library to Open with Roof Defect Lawsuit Pending
December 04, 2013 —
CDJ STAFFRepairs to the Medina County District Library in Lodi, Ohio should be complete next spring. The library’s lawsuit over the roof is just beginning. The library building was a $3 million project in 2005, but the building had to close in 2011 when it was determined that the roof was not structurally sound.
The lawsuit names six defendants, including the contractor, the framing subcontractor, and the engineering firm. The library seeking damages, legal expenses, and attorney fees. The cost of replacing the roof was $1.5 million.
Read the court decisionRead the full story...Reprinted courtesy of
NY Supreme Court Rules City Not Liable for Defective Sidewalk
February 12, 2014 —
Beverley BevenFlorez-CDJ STAFFEileen N. Fanning sued the city of Watertown, New York after incurring injuries from a fall on a sidewalk on Court Street, according to the Watertown Daily Times. A state Supreme Court judge dismissed the lawsuit.
According to Fanning as reported by the Watertown Daily Times, the plaintiff “fell on an uneven section of sidewalk” and “suffered multiple broken bones in her hand, as well as neurological damage to her arm, among other injuries.” She claimed that the damage is permanent. The lawsuit involved Purcell Construction (the landscape pavers), Neighbors of Watertown (a renovation project), and the city of Watertown.
The judge ruled that “Neighbors of Watertown was not liable for her injuries because the agency neither owned nor controlled the property where the injuries occurred and therefore ‘did not owe a duty of care’ to users of the walk as it was not responsible for the sidewalk’s maintenance.” The city was not held liable “because it had received no prior written notice about the alleged defective condition of the property.” Furthermore, the judge “agreed with Purcell Construction’s claim that the area claimed to be defective is ‘one little section’ of sidewalk ‘over which the public walked’ for nearly 20 years.”
Read the court decisionRead the full story...Reprinted courtesy of