EEOC Suit Alleges Site Managers Bullied Black Workers on NY Project
June 15, 2020 —
Emell D. Adolphus - Engineering News-RecordBullying, threats and racial slurs detail alleged “hostile” working conditions for black employees at a now complete cement plant modernization project near Albany, N.Y., in a lawsuit filed June 2 by the U.S. Equal Employment Opportunity Commission against CCC Group Inc., a San Antonio, Texas-based general contractor.
Emell D. Adolphus, Engineering News-Record
ENR may be contacted at ENR.com@bnpmedia.com
Read the full story... Read the court decisionRead the full story...Reprinted courtesy of
Congratulations to Haight Attorneys Selected to the 2024 Southern California Super Lawyers List
January 29, 2024 —
Haight Brown & Bonesteel LLPHaight attorneys have been selected to the 2024 Southern California Super Lawyers list.
Congratulations to:
- Bruce Cleeland
- Peter A. Dubrawski
- Angela S. Haskins
- Gary L. LaHendro
- Denis J. Moriarty
- Jennifer K. Saunders
Read the court decisionRead the full story...Reprinted courtesy of
Haight Brown & Bonesteel LLP
SEC Recommendations to Protect Against Cybersecurity Threats
March 09, 2020 —
Shaia Araghi and Jeffrey Dennis – Newmeyer DillionWhat Happened?
The Securities and Exchange Commission's Office of Compliance Inspections and Examinations ("OCIE") issued a detailed
report on January 27, 2020 regarding various ways for organizations to safeguard data and protect against security and data breaches. Cyber threat actors are now invading data in a more sophisticated manner than ever before, and implementation of the SEC's recommended practices are essential in order to protect from outside vulnerabilities.
What is at Risk?
If market participants fail to implement these recommended policies, they will become more vulnerable to external attacks and data breaches. This can weaken an organization or firm if all employees are not properly trained and informed of the increasing dangers of cybersecurity breaches.
What Can You Do to Protect Yourself from a Cybersecurity Threat?
1.
Governance and Risk Management. Senior leaders should make efforts to improve the cyber safety at their organization. Some of these efforts may include:
- Devote attention to overseeing the organization's cybersecurity and resilience programs;
- Develop a risk assessment process to identify and mitigate cybersecurity risks to the organization;
- Adopt and implement policies and procedures regarding these risks;
- Promptly respond and adapt to changes by updating policies and procedures when necessary; and
- Establish communication policies and procedures to provide timely information to customers, employees, and others when needed.
2.
Access Rights and Controls. Implement updated controls to determine appropriate users for organization systems, limit access as appropriate to authorized users (including the set-up of multi-factor authentication) and monitor user access.
3.
Data Loss Prevention. OCIE has recommended various important data loss prevention measures for organizations:
- Establish a vulnerability management program;
- Implement capabilities that can monitor network traffic and detect threats on endpoints;
- Establish a patch management program covering all software and hardware;
- Maintain an inventory of hardware and software assets;
- Encrypt data and implement network segmentation;
- Create an insider threat program to monitor any suspicious behaviors; and
- Secure legacy systems and equipment through disposal of sensitive information from hardware and software and by reassessing vulnerability and risk assessments.
4.
Mobile Security. Establish policies and procedures for mobile device use, manage use of mobile devices through a mobile device management application, implement security measures for internal and external users, and train employees on mobile device policies and effective practices.
5.
Incident Response and Resiliency. Detect and disclose material information regarding incidents in a timely manner and assess appropriateness of corrective actions taken in response to incidents. Organizations should develop a plan if an incident occurs, address applicable reporting requirements, assign staff to execute specific areas of the plan, and test and assess the plan. In the event that a data breach occurs, an organization should improve its resiliency by maintaining an inventory of core business services and prioritizing business operations based on an assessment of risks.
6.
Vendor Management. Establish a vendor management program to ensure that vendors meet your organization's security requirements. Organizations should aim to understand all contract terms with vendors to ensure that all parties are in agreement regarding risk and security. Organizations should also monitor third-party vendors and ensure that the vendor continues to meet the organization's security requirements.
7.
Training and Awareness. Train staff to implement cybersecurity policies of the organization. Organizations should provide cybersecurity and resiliency training and re-evaluate the effectiveness of training procedures.
A Final Reminder for Organizations
Organizations should strive to implement as many of the SEC's recommended protection measures as possible. Ensuring that senior members of an organization are leading the initiative in increased awareness about cybersecurity threats through training of employees will lead to greater cyber safety for the overall organization. Although prevention of all breaches cannot be guaranteed, developing data loss prevention plans to keep the organization and its core businesses safe from attack will benefit the entire organization.
How We Can Help
If you feel that your business falls below the SEC's recommended security measures, our firm can assist with compliance. Contact us for a free initial consultation to determine a reasonable and practical way for your business to become compliant with these guidelines.
Shaia Araghi is an associate in the firm's Privacy & Data Security, and supports the team in advising clients on cyber-related matters, including compliance and prevention that can protect their day-to-day operations. For more information on how Shaia can help, contact her at shaia.araghi@ndlf.com.
Jeff Dennis (CIPP/US) is the Head of the firm's Privacy & Data Security practice. Jeff works with the firm's clients on cyber-related issues, including contractual and insurance opportunities to lessen their risk. For more information on how Jeff can help, contact him at jeff.dennis@ndlf.com.
About Newmeyer Dillion
For 35 years, Newmeyer Dillion has delivered creative and outstanding legal solutions and trial results that achieve client objectives in diverse industries. With over 70 attorneys working as a cohesive team to represent clients in all aspects of business, employment, real estate, environmental/land use, privacy & data security and insurance law, Newmeyer Dillion delivers holistic and integrated legal services tailored to propel each client's success and bottom line. Headquartered in Newport Beach, California, with offices in Walnut Creek, California and Las Vegas, Nevada, Newmeyer Dillion attorneys are recognized by The Best Lawyers in America©, and Super Lawyers as top tier and some of the best lawyers in California and Nevada, and have been given Martindale-Hubbell Peer Review's AV Preeminent® highest rating. For additional information, call 949.854.7000 or visit www.newmeyerdillion.com.
Read the court decisionRead the full story...Reprinted courtesy of
Five "Boilerplate" Terms to Negotiate in Your Next Subcontract
November 08, 2017 —
James R. Lynch - Ahlers & Cressman PLLCWhether you negotiate your own subcontracts or rely on your lawyer to do the heavy lifting at contract time, a savvy subcontractor should understand the basic purpose of common subcontract provisions, and be prepared to negotiate for fair and commercially reasonable terms. While most sophisticated subcontractors are skilled at negotiating the core terms of a subcontract—scope of work, price, and time—a few simple but less obvious tweaks to common subcontract terms and conditions can go a long way to protect a subcontractor from unfair results when a dispute arises.
From the desk of an experienced construction lawyer, below are the first three of the top five “boilerplate” provisions that subcontractors too often overlook during contract negotiations, along with tips on language to include and to avoid.
Read the court decisionRead the full story...Reprinted courtesy of
James R. Lynch, Ahlers & Cressman PLLCMr. Lynch may be contacted at
jlynch@ac-lawyers.com
When OSHA Cites You
April 22, 2024 —
Michael Metz-Topodas - Construction ExecutiveWith the strong bonds that form among construction project teams, workers looking out for each other helps keep safety foremost in everyone’s mind. But sometimes, even the very best intentions alone can’t prevent an occasional misstep—a forgotten hard hat, a sagging rope line—which can and often does result in an OSHA citation. These regulatory reminders can bring unfortunate consequences: penalties, higher insurance premiums, potential worker injury claims, loss of bidding eligibility, loss of reputation and even public embarrassment, because citations are published on OSHA’s website.
Due to citations’ adverse effects, contractors have incentives to minimize them. They can do this by asserting available defenses, because a citation is only an alleged violation, not a confirmed one. But making defenses available begins well before a citation is issued, well before OSHA arrives to a construction site and well before a violation even occurs. Instead, contractors’ ongoing safety programs should incorporate the necessary measures to preserve OSHA citation defenses in three key areas: lack of employee exposure, lack of employer knowledge and impossibility.
EMPLOYEE EXPOSURE
To sustain a citation against an employer, OSHA must not only identify an applicable standard that the company violated but also show that the violation exposed employees to hazards and risk of injury. Absent evidence of actual exposure, OSHA often makes this showing by asserting that performing job functions necessarily exposes employees to the cited hazard.
Reprinted courtesy of
Michael Metz-Topodas, Construction Executive, a publication of Associated Builders and Contractors. All rights reserved.
Read the court decisionRead the full story...Reprinted courtesy of
Mr. Metz-Topodas may be contacted at
michael.metz-topodas@saul.com
Mitigation, Restructuring and Bankruptcy: Small Business Tools in the Era of COVID-19
June 08, 2020 —
Hannah Kreuser - Porter Law GroupThe impact of the COVID-19 pandemic has been sudden and severe. Worldwide, populations are dealing with a public health crisis, which has abruptly impacted the economy. As cases continue to increase across the United States, both the federal government and state governments, including California, are directing people to “shelter in place” and “socially distance” from each other in an attempt to curb the spread of the virus. These orders have generally shut down daily life except for “essential” businesses. As a direct result, the economy has come to an abrupt halt and many businesses have been forced to close or significantly reduce their operations.
Concern for this economic impact is, in part, due to the speed and severity with which it has affected so many industries. With the current economic conditions, there is much speculation that bankruptcy filings, among not only individuals, but small businesses, will see a sudden increase in the coming months. Experts agree that filings will increase, the only question is when.
Because of COVID-19’s economic impact, it is important that businesses make an assessment now, regarding their needs, assets, and liabilities, so they can best prepare to survive COVID-19, or to take proactive steps in preparing to enter bankruptcy or wind down. In making this assessment, one of the questions to ask is whether the business can survive with quick financing, to help bridge the gap between the current operating conditions and their return to normal.
Read the court decisionRead the full story...Reprinted courtesy of
Hannah Kreuser, Porter Law GroupMs. Kreuser may be contacted at
hkreuser@porterlaw.com
Additional Insured Coverage Confirmed
February 23, 2016 —
Tred R. Eyerly – Insurance Law HawaiiThe Texas Court of Appeals found that Exxon Mobil Corporation was an additional insured under the CGL policy for Exxon's service provider. Liberty Surplus Ins. Corp. v. Exxon Mobil Corporation, 2015 Tex. App. LEXIS 12757 (Tex. Ct. App. Dec. 17, 2015).
Exxon contracted with Wyatt Field Service Company to perform "services" as set forth in various work orders from Exxon's affiliates. The contract also required Wyatt to maintain $5 million of commercial general liability insurance. The contract provided that the policies must cover Exxon and its affiliates "as additional insureds in connection with the performance of Services."
In 2008, Wyatt was assigned to work on a flexicoker unit at Exxon's refinery. Wyatt was to reinstall dummy nozzles and chains. It completed this service in October 2008. Three years later, one of the dummy nozzles pulled free, and the escaping steam and coke burned three individuals who were working on the unit. After the accident, it was discovered that the safety chain had been installed in the wrong location so that it did not properly secure the dummy nozzle.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Insurance Law HawaiiMr. Eyerly may be contacted at
te@hawaiilawyer.com
Hamptons Home Up for Foreclosure That May Set Record
May 13, 2014 —
Prashant Gopal – BloombergA home in New York’s Hamptons on Further Lane, where comedian Jerry Seinfeld and hedge-fund manager Steven A. Cohen own estates, is up for auction in what will be one of the area’s biggest foreclosure sales.
More than $10.5 million is owed on the 1.8-acre (0.7-hectare) property at 80 Further Lane in East Hampton, according to Daniel Murphy, the Riverhead, New York-based attorney who is scheduled to conduct the sale on June 10.
Read the court decisionRead the full story...Reprinted courtesy of
Prashant Gopal, BloombergMr. Gopal may be contacted at
pgopal2@bloomberg.net