Fall 2024 Legislative Update:
October 28, 2024 —
Joshua Lane - Ahlers Cressman & Sleight PLLCReview of (a) RCW 60.30.010-020, (b) RCW 49.17.530, (c) RCW 19.95.020, (d) RCW 39.116.005, et seq., (e) RCW 36.70B.080, and (f) RCW 39.12.010 and .13
While much of the focus on the recent legislative updates has been on RCW 39.04.360, a number of other legislative changes may also have significant impacts on Washington’s construction industry. Six of these changes are summarized below.
A. RCW 60.30.010 and .020 (SSB 6108) – Concerning Retainage on Private Construction, Effective June 6, 2024
Last year, ESSB 5528 imposed restrictions and obligations related to retainage and timing of final payment on private (non-public works) projects. It capped retainage at 5%, required prompt payment on final payments, and required owners to accept a retainage bond on private construction projects, excluding single-family residential construction less than 12 units.
This year, SSB 6108 adds suppliers to the statutes (RCW 60.30.010 and 0.020) pertaining to retainage on private construction projects.
Read the court decisionRead the full story...Reprinted courtesy of
Joshua Lane, Ahlers Cressman & Sleight PLLCMr. Lane may be contacted at
joshua.lane@acslawyers.com
Seattle’s Tallest Tower Said Readying to Go On the Market
March 12, 2015 —
Hui-yong Yu – Bloomberg(Bloomberg) -- Seattle’s Columbia Center, the curved black office tower that’s the city’s tallest building, is poised to go on the market as its owners seek to tap into robust demand for U.S. real estate.
Beacon Capital Partners, a Boston-based private-equity real estate company, is working with Eastdil Secured LLC on the sale of the 76-story Columbia Center, the second-tallest U.S. building west of Chicago, according to a person with knowledge of the matter. Formal marketing is likely to begin in coming months, said the person, who asked not to be identified because the process is private.
Read the court decisionRead the full story...Reprinted courtesy of
Hui-yong Yu, BloombergMs. Yu may be contacted at
hyu@bloomberg.net
Fifth Circuit Holds Insurer Owes Duty to Defend Latent Condition Claim That Caused Fire Damage to Property Years After Construction Work
October 05, 2020 —
Jeremy S. Macklin - Traub Lieberman Insurance Law BlogMost general liability policies only provide coverage for “property damage” that occurs during the policy period. Thus, when analyzing coverage for a construction defect claim, it is important to ascertain the date on which damage occurred. Of course, the plaintiffs’ bar crafts pleadings to be purposefully vague as to the date (or period) of damage to property. A recent Fifth Circuit decision applying Texas law addresses this coverage issue in the context of allegations of a condition created by an insured during the policy period that caused damage after the policy expired.
In Gonzalez v. Mid-Continent Cas. Co., 969 F.3d 554 (5th Cir. 2020), Gilbert Gonzales (the insured) was a siding contractor. In 2013, the underlying plaintiff hired Gonzales to install new siding on his house. In 2016, the underlying plaintiff’s house was damaged in a fire. The underlying plaintiff sued Gilbert in Texas state court alleging that when Gonzalez installed the siding in 2013, he hammered nails through electrical wiring and created a dangerous condition that caused a fire three years later in 2016.
At the time Gilbert performed construction work, he was insured by Mid-Continent Casualty Company. Mid-Continent disclaimed coverage to Gonzales on the basis that the complaint unequivocally alleged that property was damaged in 2016 and there were no allegations that property damage occurred prior to 2016 or was continuing in nature.
Read the court decisionRead the full story...Reprinted courtesy of
Jeremy S. Macklin, Traub LiebermanMr. Macklin may be contacted at
jmacklin@tlsslaw.com
SEC Recommendations to Protect Against Cybersecurity Threats
March 09, 2020 —
Shaia Araghi and Jeffrey Dennis – Newmeyer DillionWhat Happened?
The Securities and Exchange Commission's Office of Compliance Inspections and Examinations ("OCIE") issued a detailed
report on January 27, 2020 regarding various ways for organizations to safeguard data and protect against security and data breaches. Cyber threat actors are now invading data in a more sophisticated manner than ever before, and implementation of the SEC's recommended practices are essential in order to protect from outside vulnerabilities.
What is at Risk?
If market participants fail to implement these recommended policies, they will become more vulnerable to external attacks and data breaches. This can weaken an organization or firm if all employees are not properly trained and informed of the increasing dangers of cybersecurity breaches.
What Can You Do to Protect Yourself from a Cybersecurity Threat?
1.
Governance and Risk Management. Senior leaders should make efforts to improve the cyber safety at their organization. Some of these efforts may include:
- Devote attention to overseeing the organization's cybersecurity and resilience programs;
- Develop a risk assessment process to identify and mitigate cybersecurity risks to the organization;
- Adopt and implement policies and procedures regarding these risks;
- Promptly respond and adapt to changes by updating policies and procedures when necessary; and
- Establish communication policies and procedures to provide timely information to customers, employees, and others when needed.
2.
Access Rights and Controls. Implement updated controls to determine appropriate users for organization systems, limit access as appropriate to authorized users (including the set-up of multi-factor authentication) and monitor user access.
3.
Data Loss Prevention. OCIE has recommended various important data loss prevention measures for organizations:
- Establish a vulnerability management program;
- Implement capabilities that can monitor network traffic and detect threats on endpoints;
- Establish a patch management program covering all software and hardware;
- Maintain an inventory of hardware and software assets;
- Encrypt data and implement network segmentation;
- Create an insider threat program to monitor any suspicious behaviors; and
- Secure legacy systems and equipment through disposal of sensitive information from hardware and software and by reassessing vulnerability and risk assessments.
4.
Mobile Security. Establish policies and procedures for mobile device use, manage use of mobile devices through a mobile device management application, implement security measures for internal and external users, and train employees on mobile device policies and effective practices.
5.
Incident Response and Resiliency. Detect and disclose material information regarding incidents in a timely manner and assess appropriateness of corrective actions taken in response to incidents. Organizations should develop a plan if an incident occurs, address applicable reporting requirements, assign staff to execute specific areas of the plan, and test and assess the plan. In the event that a data breach occurs, an organization should improve its resiliency by maintaining an inventory of core business services and prioritizing business operations based on an assessment of risks.
6.
Vendor Management. Establish a vendor management program to ensure that vendors meet your organization's security requirements. Organizations should aim to understand all contract terms with vendors to ensure that all parties are in agreement regarding risk and security. Organizations should also monitor third-party vendors and ensure that the vendor continues to meet the organization's security requirements.
7.
Training and Awareness. Train staff to implement cybersecurity policies of the organization. Organizations should provide cybersecurity and resiliency training and re-evaluate the effectiveness of training procedures.
A Final Reminder for Organizations
Organizations should strive to implement as many of the SEC's recommended protection measures as possible. Ensuring that senior members of an organization are leading the initiative in increased awareness about cybersecurity threats through training of employees will lead to greater cyber safety for the overall organization. Although prevention of all breaches cannot be guaranteed, developing data loss prevention plans to keep the organization and its core businesses safe from attack will benefit the entire organization.
How We Can Help
If you feel that your business falls below the SEC's recommended security measures, our firm can assist with compliance. Contact us for a free initial consultation to determine a reasonable and practical way for your business to become compliant with these guidelines.
Shaia Araghi is an associate in the firm's Privacy & Data Security, and supports the team in advising clients on cyber-related matters, including compliance and prevention that can protect their day-to-day operations. For more information on how Shaia can help, contact her at shaia.araghi@ndlf.com.
Jeff Dennis (CIPP/US) is the Head of the firm's Privacy & Data Security practice. Jeff works with the firm's clients on cyber-related issues, including contractual and insurance opportunities to lessen their risk. For more information on how Jeff can help, contact him at jeff.dennis@ndlf.com.
About Newmeyer Dillion
For 35 years, Newmeyer Dillion has delivered creative and outstanding legal solutions and trial results that achieve client objectives in diverse industries. With over 70 attorneys working as a cohesive team to represent clients in all aspects of business, employment, real estate, environmental/land use, privacy & data security and insurance law, Newmeyer Dillion delivers holistic and integrated legal services tailored to propel each client's success and bottom line. Headquartered in Newport Beach, California, with offices in Walnut Creek, California and Las Vegas, Nevada, Newmeyer Dillion attorneys are recognized by The Best Lawyers in America©, and Super Lawyers as top tier and some of the best lawyers in California and Nevada, and have been given Martindale-Hubbell Peer Review's AV Preeminent® highest rating. For additional information, call 949.854.7000 or visit www.newmeyerdillion.com.
Read the court decisionRead the full story...Reprinted courtesy of
Trial Victory in San Mateo County!
February 24, 2020 —
Wilke FleuryWilke Fleury attorneys
Adriana Cervantes and
Matt Powell recently prevailed at trial in a case involving a real property dispute in San Mateo County.
Wilke Fleury represented the owner of an apartment building in an action against an individual who recently acquired the duplex on the adjoining property. As set forth in the pleadings, the Apartment’s owner, tenants, and invitees, used the property in many ways including access, parking, and recreational purposes for over five years, and the new owner had actual notice of that use before the purchase. Nonetheless, the new owner insisted the Apartment had no right to use the property, and filed an action to quiet title.
Wilke Fleury filed a cross-complaint on behalf of the Apartment alleging that it had a prescriptive easement over the property.
Read the court decisionRead the full story...Reprinted courtesy of
Wilke Fleury
Delaware River Interstate Bridge Shut to Assess Truss Fracture
January 26, 2017 —
Justin Rice - Engineering News-RecordThe Delaware River Bridge, which runs between Pennsylvania and New Jersey, was shut down indefinitely over the Jan. 22-23 weekend, after a large fracture was discovered in the bridge that connects the turnpikes of the two states. The fracture on a steel truss below the bridge deck on the Pennsylvania side was discovered during a routine check as part of a painting operation. Steel plates were installed to temporarily reconnect the fracture and stabilize the 1.5-mile bridge, which is located in Bucks County on I-276 and accommodates 42,000 vehicles a day. As engineers assess how the damage will impact the entire bridge, a sample from the fractured truss was sent to a forensic lab to determine the cause of the crack. A high-definition video survey is being used to monitor the bridge.
Read the court decisionRead the full story...Reprinted courtesy of
Justin Rice, ENRMr. Rice may be contacted at
ricej@enr.com
L.A. Makes $4.5 Billion Bet on Olympics After Boston Backs Out
August 26, 2015 —
James Nash – BloombergLos Angeles’s dreams of hosting the Olympic Games for a third time could get a boost from the City Council this week, even as officials try to assure taxpayers that they won’t be forced to bail out a botched effort.
The council is expected to vote Wednesday on giving Mayor Eric Garcetti power to negotiate with the U.S. Olympic Committee to bring the 2024 games to Los Angeles and require the city to pay for cost overruns.
Los Angeles emerged as the U.S. contender for the games after Boston withdrew from consideration in July. Opponents there warned that taxpayers were on the hook if the nearly month-long sporting event lost money.
Read the court decisionRead the full story...Reprinted courtesy of
James Nash, Bloomberg
Toward Increased Citizen Engagement in Urban Planning
November 14, 2018 —
Aarni Heiskanen - AEC BusinessDigitalization creates new opportunities for citizen engagement in urban planning. I gave a short presentation on the topic at the Digitalization in Urban Planning event in Helsinki.
The event was organized by CHAOS Architects, a tech company. Its AI cloud platform allows citizens to share ideas about their city and co-create it with their community. The platform contains engagement-driven applications and third-party APIs that process business intelligence for better interaction and decision-making.
Read the court decisionRead the full story...Reprinted courtesy of
Aarni Heiskanen, AEC BusinessMr. Heiskanen may be contacted at
aec-business@aepartners.fi