Contractor Pleads Guilty to Disadvantaged-Business Fraud
November 17, 2016 —
Tom Ichniowski – Engineering News-RecordIn the latest development in a federal small disadvantaged-business case, a construction company executive has pleaded guilty to a charge of conspiring to commit wire fraud.
Read the court decisionRead the full story...Reprinted courtesy of
Tom Ichniowski, Engineering News-RecordMr. Ichniowski may be contacted at
ichniowskit@enr.com
Render Unto Caesar: Considerations for Returning Withheld Sums
January 18, 2021 —
William E. Underwood Partner, Jones Walker LLP - ConsensusDocsWithholding sums during a dispute can be an effective and perfectly legitimate means to protect against the harms caused by another party’s breach. However, withholding too much money during a dispute can turn a position of strength into one of weakness.
“Why should I fund the other side’s litigation war chest?” and “Isn’t this just a display of weakness?” are common questions raised by contractors when this issue is discussed. Often, the contractor is well within its contractual or legal rights to withhold money from a breaching subcontractor (another topic for another day). But it may not always be in a contractor’s best interest to withhold every single penny available.
This article addresses some of the long-term implications for failing to return withheld sums, including the potential to recover attorneys’ fees, possible bad faith, accruing interest, and overall litigation costs. Admittedly, it can be hard to give money back in the middle of a dispute. But sometimes it can positively impact the overall outcome of the case.
Read the court decisionRead the full story...Reprinted courtesy of
William E. Underwood, Jones Walker LLP (ConsensusDocs)Mr. Underwood may be contacted at
wunderwood@joneswalker.com
Neither Designated Work Exclusion nor Pre-Existing Damage Exclusion Defeat Duty to Defend
March 12, 2015 —
Tred R. Eyerly – Insurance Law HawaiiA duty to defend existed for alleged construction defects despite the designated work exclusion and the pre-existing damage exclusion. Gemini Ins. Co. v. N. Am Capacity Ins. Co., 2015 U.S. Dist. LEXIS 14836 (D. Nev. Feb. 6, 2015).
Olsen Construction Company held three separate policies issued by Gemini from September 2002 to February 2005. North American issued a CGL policy to Olsen for the period February 2005 to February 2006. Olsen conducted repair work on decks at the location between 2002 and 2003.
Olsen was sued for construction defects by the Homeowners' Association (HOA). Gemini defended and also tendered to North American. When North American refused the tender, Gemini sued for declaratory and equitable relief related to North American's duty to defend Olsen in the underlying case. North American moved for summary judgment.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Insurance Law HawaiiMr. Eyerly may be contacted at
te@hawaiilawyer.com
How Fort Lauderdale Recovered a Phished $1.2M Police HQ Project Payment
May 13, 2024 —
Richard Korman - Engineering News-RecordJan. 25th was a happy day for the city of Fort Lauderdale, Fla., as Mayor Dean Trentalis and Police Chief William Schultz announced in a press conference the recovery of a $1.162-million electronic payment meant for Moss Construction that had been stolen in September via an email phishing fraud.
Reprinted courtesy of
Richard Korman, Engineering News-Record
Mr. Korman may be contacted at kormanr@enr.com
Read the full story... Read the court decisionRead the full story...Reprinted courtesy of
SEC Recommendations to Protect Against Cybersecurity Threats
March 09, 2020 —
Shaia Araghi and Jeffrey Dennis – Newmeyer DillionWhat Happened?
The Securities and Exchange Commission's Office of Compliance Inspections and Examinations ("OCIE") issued a detailed
report on January 27, 2020 regarding various ways for organizations to safeguard data and protect against security and data breaches. Cyber threat actors are now invading data in a more sophisticated manner than ever before, and implementation of the SEC's recommended practices are essential in order to protect from outside vulnerabilities.
What is at Risk?
If market participants fail to implement these recommended policies, they will become more vulnerable to external attacks and data breaches. This can weaken an organization or firm if all employees are not properly trained and informed of the increasing dangers of cybersecurity breaches.
What Can You Do to Protect Yourself from a Cybersecurity Threat?
1.
Governance and Risk Management. Senior leaders should make efforts to improve the cyber safety at their organization. Some of these efforts may include:
- Devote attention to overseeing the organization's cybersecurity and resilience programs;
- Develop a risk assessment process to identify and mitigate cybersecurity risks to the organization;
- Adopt and implement policies and procedures regarding these risks;
- Promptly respond and adapt to changes by updating policies and procedures when necessary; and
- Establish communication policies and procedures to provide timely information to customers, employees, and others when needed.
2.
Access Rights and Controls. Implement updated controls to determine appropriate users for organization systems, limit access as appropriate to authorized users (including the set-up of multi-factor authentication) and monitor user access.
3.
Data Loss Prevention. OCIE has recommended various important data loss prevention measures for organizations:
- Establish a vulnerability management program;
- Implement capabilities that can monitor network traffic and detect threats on endpoints;
- Establish a patch management program covering all software and hardware;
- Maintain an inventory of hardware and software assets;
- Encrypt data and implement network segmentation;
- Create an insider threat program to monitor any suspicious behaviors; and
- Secure legacy systems and equipment through disposal of sensitive information from hardware and software and by reassessing vulnerability and risk assessments.
4.
Mobile Security. Establish policies and procedures for mobile device use, manage use of mobile devices through a mobile device management application, implement security measures for internal and external users, and train employees on mobile device policies and effective practices.
5.
Incident Response and Resiliency. Detect and disclose material information regarding incidents in a timely manner and assess appropriateness of corrective actions taken in response to incidents. Organizations should develop a plan if an incident occurs, address applicable reporting requirements, assign staff to execute specific areas of the plan, and test and assess the plan. In the event that a data breach occurs, an organization should improve its resiliency by maintaining an inventory of core business services and prioritizing business operations based on an assessment of risks.
6.
Vendor Management. Establish a vendor management program to ensure that vendors meet your organization's security requirements. Organizations should aim to understand all contract terms with vendors to ensure that all parties are in agreement regarding risk and security. Organizations should also monitor third-party vendors and ensure that the vendor continues to meet the organization's security requirements.
7.
Training and Awareness. Train staff to implement cybersecurity policies of the organization. Organizations should provide cybersecurity and resiliency training and re-evaluate the effectiveness of training procedures.
A Final Reminder for Organizations
Organizations should strive to implement as many of the SEC's recommended protection measures as possible. Ensuring that senior members of an organization are leading the initiative in increased awareness about cybersecurity threats through training of employees will lead to greater cyber safety for the overall organization. Although prevention of all breaches cannot be guaranteed, developing data loss prevention plans to keep the organization and its core businesses safe from attack will benefit the entire organization.
How We Can Help
If you feel that your business falls below the SEC's recommended security measures, our firm can assist with compliance. Contact us for a free initial consultation to determine a reasonable and practical way for your business to become compliant with these guidelines.
Shaia Araghi is an associate in the firm's Privacy & Data Security, and supports the team in advising clients on cyber-related matters, including compliance and prevention that can protect their day-to-day operations. For more information on how Shaia can help, contact her at shaia.araghi@ndlf.com.
Jeff Dennis (CIPP/US) is the Head of the firm's Privacy & Data Security practice. Jeff works with the firm's clients on cyber-related issues, including contractual and insurance opportunities to lessen their risk. For more information on how Jeff can help, contact him at jeff.dennis@ndlf.com.
About Newmeyer Dillion
For 35 years, Newmeyer Dillion has delivered creative and outstanding legal solutions and trial results that achieve client objectives in diverse industries. With over 70 attorneys working as a cohesive team to represent clients in all aspects of business, employment, real estate, environmental/land use, privacy & data security and insurance law, Newmeyer Dillion delivers holistic and integrated legal services tailored to propel each client's success and bottom line. Headquartered in Newport Beach, California, with offices in Walnut Creek, California and Las Vegas, Nevada, Newmeyer Dillion attorneys are recognized by The Best Lawyers in America©, and Super Lawyers as top tier and some of the best lawyers in California and Nevada, and have been given Martindale-Hubbell Peer Review's AV Preeminent® highest rating. For additional information, call 949.854.7000 or visit www.newmeyerdillion.com.
Read the court decisionRead the full story...Reprinted courtesy of
Home Building Up in Kansas City
November 20, 2013 —
CDJ STAFFIt’s been a good year for home builders in Kansas City, Missouri. In fact, it’s the best year since 2007. The total number of home permits issued through October exceeds the number issued in 2012 by 164, having reached 3,463. Sara Corless, executive vice president of the Builders Association, focused more on the growth, though she noted that some builders were hoping the year’s total would exceed 4,000, which she described as “a psychological victory at a minimum.”
The Kansas City metropolitan area lead the state in the number of building permits issued.
Read the court decisionRead the full story...Reprinted courtesy of
BHA Attending the Construction Law Conference in San Antonio, TX
February 18, 2015 —
Beverley BevenFlorez-CDJ STAFFBert L. Howe & Associates, Inc. (BHA) is proud to be joining with the State Bar of Texas, Construction Law Section as a sponsor and exhibitor at the event, and is excited to announce that they will also be sponsoring a raffle for a $100 Nordstrom gift card to given away at the Conference. Just stop by the BHA booth, and drop your card in the bowl for a chance to win.
With offices in San Antonio and Houston, BHA offers the experience of over 20 years of service to carriers, defense counsel, and insurance professionals as designated experts in nearly 5,500 cases. BHA’s staff encompasses a broad range of licensed and credentialed experts in the areas of general contracting and specialty trades, as well as architects, civil and structural engineers, and has provided services on behalf of developers, general contractors and subcontractors across the state of Texas.
BHA’s experience covers the full range of construction defect litigation, including single and multi-family residential (including high-rise), institutional (schools, hospitals and government buildings), commercial, and industrial claims. BHA also specializes in coverage, exposure, and delay claim analysis.
Download the seminar brochure and register...
Read the court decisionRead the full story...Reprinted courtesy of
Texas Supreme Court Holds Stipulated Extrinsic Evidence May Be Considered in Determining Duty to Defend
May 10, 2022 —
Tred R. Eyerly - Insurance Law HawaiiResponding to certified questions from the Fifth Circuit, the Texas Supreme Court held that in limited circumstances, extrinsic evidence may be considered in determining the duty to defend. Monroe Guar. Ins. Co. v. Bitco Gen. Ins. Corp., 2022 Tex. LEXIS 148 (Tex. Feb. 11, 2022).
The two insurers each provided CGL coverage to the insured, 5D Drilling & Pump Service, Inc., at different times. BIitco provided two consecutive one-year CGL policies covering October 2013 to October 2015. Monroe's CGL policy covered 5D from October 2015 to October 2016.
5D was sued by David Jones for breach of contract and negligence, seeking damage allegedly resulting from 5D's drilling operations on Jones's property. Jones contracted with 5D in the summer of 2014 to drill a 3600-foot irrigation well on his farmland. The complaint did not detail when 5D's purportedly negligent acts occurred or even when 5D began or stopped the work.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Damon Key Leong Kupchak HastertMr. Eyerly may be contacted at
te@hawaiilawyer.com