Insurer Ordered to Participate in Appraisal
March 27, 2023 —
Tred R. Eyerly - Insurance Law HawaiiThe court found that the insured's request for an appraisal was timely and ordered the insurer to participate. Cloisters of Naples, Inc v. Landmark Am. Ins. Co., 2023 U.S. Dist. LEXIS 6884 (M.D. Flag. Jan. 13, 2023).
A hurricane damaged Cloisters, a condominium. Cloisters made a claim under its commercial insurance policy with Landmark. Landmark acknowledged coverage but failed to pay what Cloisters thought was needed. Cloisters sued.
The policy had a standard appraisal provision, but another clause had a suit litigation provision requiring a request for appraisal within two years after physical loss to the property. The dispute was whether Florida law, allowing appraisal clauses to be valid for 130 years, or Georgia law, which had no such extension on requesting an appraisal. Landmark contended the contract was formed in Georgia, so its law should apply. Florida followed the lure of lex loci, which provided that the law of the jurisdiction where the contract was executed governed.
Read the court decisionRead the full story...Reprinted courtesy of
Tred R. Eyerly, Damon Key Leong Kupchak HastertMr. Eyerly may be contacted at
te@hawaiilawyer.com
Advice to Georgia Homeowners with Construction Defects
October 02, 2013 —
CDJ STAFFNOLO Press has some advice for Georgia homeowners who have found construction defects. Their first advice is to make certain matters don’t get any worse. They note that the “the builder is not responsible for any damage that occurs to the home after you’ve discovered the problem.” You should keep records of those repairs, since you can’t get reimbursed unless you can prove what you spent.
Some problems are covered under builder warranties, but usually only in the first year. But if it’s not covered, or the warranty has expired, NOLO notes that “you might not be out of luck.” The three options under Georgia law are to claim breach of contract, negligent construction, or fraud.
NOLO gives the example that if the house was not built according to the plans, the builder might be found guilty of breach of contract. If the builder worked in “a shoddy manner that no other builder would use,” then it might be negligent construction. “If the builder outright lied about the quality or type of materials used,” you might have a claim for fraud.
However, NOLO notes that first you must notify the builder. Under Georgia law, you have to inform the builder of the problems 90 days before you can file a lawsuit, and the builder has 30 days in which to respond to your claims. The hope of Georgia’s Right to Repair Act is to avoid a lawsuit and get the house fixed. And that’s always the best result.
Read the court decisionRead the full story...Reprinted courtesy of
Texas Supreme Court Holds Anadarko’s $100M Deepwater Horizon Defense Costs Are Not Subject To Joint Venture Liability Limits
February 27, 2019 —
Sergio F. Oehninger & Michael S. Levine - Hunton Andrews KurthReversing a Texas Court of Appeals decision that allowed Anadarko’s Lloyd’s of London excess insurers to escape coverage for more than $100 million in defense costs incurred in connection with claims from the Deepwater Horizon well blowout, the Supreme Court of Texas held that the insurers’ obligations to pay defense costs under an “energy package” liability policy are not capped by a joint venture coverage limit for “liability” insured. Anadarko Petroleum Corp. et al. v. Houston Casualty Co. et al., No. 16-1013 (Tex. Jan. 25, 2019).
While the Lloyd’s of London insurers had agreed to pay Anadarko $37.5 million for damages, they declined to cover $100 million-plus in defense fees, arguing that both Anadarko’s liability and defense expenses are subject to the $37.5 million joint venture limit for “liability” insured. Anadarko asserted that only amounts paid as damages to third parties are subject to that limit. Defense costs, however, are not amounts paid as damages to a third party and, thus, are not a “liability.” Those amounts, therefore, are not subject to the joint venture limit and are instead subject to the policy’s $150 million coverage limit.
Reprinted courtesy of
Sergio F. Oehninger, Hunton Andrews Kurth and
Michael S. Levine, Hunton Andrews Kurth
Mr. Oehninger may be contacted at soehninger@HuntonAK.com
Mr. Levine may be contacted at mlevine@HuntonAK.com
Read the court decisionRead the full story...Reprinted courtesy of
Breach of a Construction Contract & An Equitable Remedy?
September 22, 2016 —
David Adelstein – Florida Construction Legal UpdatesIn payment or collection-type lawsuits, the party suing for money sometimes asserts a claim for unjust enrichment or quantum meruit as an alternative equitable remedy to a breach of contract claim. Frankly, sometimes a party will do this as a means to throw everything against the wall hoping something, just something, sticks. However, if there is a contract by and between the parties, equitable claims such as unjust enrichment or quantum meruit will invariably fail. They will fail because a party cannot circumvent a contract simply because their recourse may prove better under an equitable theory. It doesn’t work like that! And, it should not!
Read the court decisionRead the full story...Reprinted courtesy of
David M. Adelstein, Kirwin NorrisMr. Adelstein may be contacted at
dma@kirwinnorris.com
Downtown Sacramento Building Riddled with Defects
July 23, 2014 —
Beverley BevenFlorez-CDJ STAFFThe Board of Equalization tower in Sacramento, California has gone through $60 million in repairs to deal with issues such as bats, floods, leaky windows, mold, and glass panels that would “pop off the building with no warning and shatter on the sidewalk,” according to Insurance News. However, an additional $115 million in repairs are planned to deal with “crumbling core plumbing” and “concrete-and-glass exterior,” among other problems.
Now, “a Sacramento attorney filed a $50 million tort claim this month, a first step toward suing the tax-collecting department on behalf of employees who say their bosses downplayed the building's ailments and put workers' health at risk.”
"Even though my lawyers told me not to say this, I don't think it's safe," board Chairman Jerome Horton told Insurance News.
Read the court decisionRead the full story...Reprinted courtesy of
Statute of Limitations and Bad Faith Claims: Factors to Consider
May 16, 2022 —
Anastasiya Collins - Saxe Doernberger & Vita How much time do our clients have to bring a bad faith action against an insurer? Although we are not frequently asked this question, it is one that we constantly analyze before asserting a bad faith claim.
To answer this question, we look to the statute of limitations, which is a law passed by a state legislative body that sets the maximum amount of time for a party to bring a claim based upon a particular cause of action. For policyholders, knowing which statute of limitations applies to their bad faith claim is critical because it indicates whether it is possible to initiate legal proceedings. In addition, it determines the amount in damages available in case of a successful resolution.
Statute of Limitations in Breach of Contract vs. Tort Claims
One key determinant of a statute of limitations for bad faith is whether the claim is brought as a tort or a breach of contract action. The consequence of framing bad faith as a tort is that a policyholder is not just limited to contract damages. The policyholder can also receive recourse for emotional distress, pain, suffering, punitive damages, attorney’s fees, and other damages that the court may consider appropriate. Unfortunately, however, not every jurisdiction allows plaintiffs to bring bad faith actions as tort claims. While, for example, courts in California, Colorado, and Connecticut allow bad faith claims sounding in tort, courts in jurisdictions such as Tennessee do not.
Read the court decisionRead the full story...Reprinted courtesy of
Anastasiya Collins, Saxe Doernberger & VitaMs. Collins may be contacted at
ACollins@sdvlaw.com
The "Dark Overlord" Strikes The Practice Of Law: What Law Firms Can Do To Protect Themselves
April 17, 2019 —
Ivo G. Danielle – Newmeyer & DillionCybersecurity breaches involving law firms are on the rise with each passing year. Law firms are prime targets for cyber criminals seeking confidential and sensitive information because of the various types of legal work that law firms normally handle for their clients. Whether it be mergers and acquisitions, the use of intellectual property, purchase agreements, bankruptcy or even litigation involving divorce, law firms are a rich depository for highly confidential and sensitive information. As a result, law firms must employ comprehensive security measures to protect themselves from security breaches or risk being on the losing end of a costly malpractice claim, and suffer severe reputational harm.
Law Firms Continue To Be Targeted By Cybercriminals
According to the American Bar Association ("ABA") 2018 Legal Technology Survey Report, 23% of the law firms who participated in the survey reported that their law firm experienced a data breach. Although this may be just a 1% increase from the 22% who reported a breach in 2017, it is important to understand that this is an increase of 8% from the stable percentages reported from 2013 through 2016.1 The 2018 survey report also revealed that security breaches fluctuated with firm size – 14% for solo law firms, 24% for firms employing 2-9 attorneys, approximately 24% for firms with 10-49 attorneys, 42% for firms with 50-99 attorneys, and approximately 31% for those firms employing 100 or more attorneys.
Latest Law Firm Security Breaches
The notorious criminal group called "The Dark Overlord" has a history of committing data breaches of high profile companies such as Gorilla Glue, Netflix, Larson Studios, multiple healthcare companies, and Little Red Door Cancer Agency. Their goal is simple – steal sensitive information and then extort payment from the victims by threatening to release the sensitive information to the public.
On December 31, 2018, this cybercriminal group announced to the world that they had acquired 18,000 documents containing highly sensitive legal information related to insurance based litigation connected to the 9/11 tragedy. The stolen information was the attorney/client property of Lloyd's of London, Silverstein Properties, and Hiscox Syndicates, Ltd. In its announcement, The Dark Overlord boasted that they were in possession of client sensitive information, such as: "emails; retainer agreements; non-disclosure agreements; settlements, litigation strategies; liability analysis; defense formation; collection of expert witness testimonies; communication with government officials in countries all over the world; voice mails; dealings with the FBI, USDOJ, DOD, confidential communications, and so much more."
Subsequent to the data breach, The Dark Overlord announced to the public that they designed a compensation plan that would allow for public crowd-funding for its organization to permit the public to view the stolen information in exchange for bitcoin payment. The more public funding it receives, the more stolen sensitive information will be unlocked and released to the public. It is estimated that this cybercriminal group already distributed information to the public on two separate occasions during the month of January 2019.
High profile cybersecurity breaches of law firms is nothing new – for example, the infamous Panama Papers breach, where cybercriminals leaked 11.5 million documents exposing the shadowy business of setting up offshore corporations as tax shelters for businesses, celebrities, and politicians - and the infamous Petya Malware attack which resulted in a digital lockdown of one of the world's largest law firms, DLA Piper. However, despite the infrequency of publicized cyber-attacks of law firms by the media, the FBI has recently announced that law firms should expect an increase in security attacks by cybercriminals because law firms are now viewed as "one-stop shops" for cybercriminals. Therefore, in order to combat the inevitable increase in cyber-attacks, law firms must get prepared.
How Law Firms Can Protect Themselves
All law firms will agree that the most serious consequence of a security breach for their firm would be the unauthorized access to sensitive client data. The American Bar Association's Model Rules of Professional Conduct, specifically Rules 1.1 and 1.62 and related Comments, require an attorney to take competent and reasonable measures to safeguard information relating to their clients. This duty to "safeguard' information imposes a significant challenge to firms when using technology in connection with protecting client information because most law firms are not savvy with technology and lack proper cyber security training.
In order for a law firm to protect itself from security breaches and inadvertently violate its duty of safeguarding a client's sensitive information, it is important to take the following actions:
- Start by taking an inventory and risk assessment of the firm to determine what needs to be protected – the inventory should include both technology and data;
- Develop, implement and maintain an appropriate cybersecurity program that complies with applicable ethical and legal obligations;
- Ensure the cybersecurity program addresses people, policies and procedures, and technology. The cybersecurity program must designate an individual or a group to be in charge and coordinate security;
- Develop an incident response plan scaled to the size of the firm;
- Continually train staff and attorneys to identify and understand potential cybersecurity threats;
- Consider implementing a third-party assessment of firm's cybersecurity program and policies;
- Purchase cyber liability for insurance which not only covers first party losses to law firms (like lost productivity, data restoration, and legal expenses) but also liability protection to third parties;
- Implement authentication and access controls for network, computers and mobile devices used by the firm's staff and attorneys;
- Consider the use of full-drive encryption for computers and mobile devices;
- Have staff and attorneys avoid and/or limit the use of public WiFi when working remotely; and
- Create a disaster recovery plan to backup all data in the event of a cyber-attack or natural catastrophe.
Continually reviewing, implementing, training and updating a firm's cybersecurity program and protocols will help safeguard sensitive and confidential client information and/or data. No law firm wants to be the next data breach headline – so take the necessary steps to avoid a potential disaster.
1 Past ABA Legal Technology Surveys reported 14% in 2016, 15% in 2015, 14% in 2014 and 15% in 2013.
2 On November 1, 2018, California adopted ethics rules patterned after the ABA Model Rules of Professional Conduct.
Ivo Daniele is a seasoned associate in Newmeyer & Dillion's Walnut Creek office. His practice includes representing private and public companies with both their transactional and litigation needs. You can reach Ivo at ivo.daniele@ndlf.com.
About Newmeyer & Dillion
For almost 35 years, Newmeyer & Dillion has delivered creative and outstanding legal solutions and trial results for a wide array of clients. With over 70 attorneys practicing in all aspects of business law, privacy & data security, employment, real estate, construction, insurance law and trial work, Newmeyer & Dillion delivers legal services tailored to meet each client's needs. Headquartered in Newport Beach, California, with offices in Walnut Creek, California and Las Vegas, Nevada, Newmeyer & Dillion attorneys are recognized by The Best Lawyers in America©, and Super Lawyers as top tier and some of the best lawyers in California, and have been given Martindale-Hubbell Peer Review's AV Preeminent® highest rating. For additional information, call 949.854.7000 or visit www.ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of
Builders Beware: Smart Homes Under Attack by “Hide ‘N Seek” Botnet
October 30, 2018 —
Scott L. Satkin & Amtoj S. Randhawa - Newmeyer & Dillion LLPGerman manufacturer eQ-3 has found itself under siege by a botnet known as "Hide 'N Seek." This pernicious malware has infected tens of thousands of eQ-3's smart home devices by compromising the device's central control unit. Once a device has been infected, the malware spreads to other Internet of Things ("IoT") devices connected to the same wireless network. IoT devices have become the prime target for botnet attacks. As opposed to computers, laptops, or other larger computing devices, the smaller storage capacity and lower processing power of IoT devices limit the amount and complexity of the security measures that can be installed—making them an easier target for botnets.
What is a Botnet?
For those unfamiliar with the term, a botnet is a network of devices infected with a malware program allowing the infector to control and/or exploit the devices. Once a suitable number of devices are infected, the person or group controlling the botnet can harness the computing power of each infected device to perform activities which were previously constrained by a single device's capabilities (i.e. DDoS attacks, spamming, cryptocurrency mining, etc.).
Hide 'N Seek – History and Capabilities
The Hide 'N Seek botnet first appeared in January 2018 and has since spread rapidly. Its sophisticated design and capabilities have captivated the attention of many security watchdogs and researchers. While many botnets are designed to be "quick and dirty" (i.e. infect a few devices, eke out a little profit, and inevitably be cleared out or rendered ineffective by security updates and fixes), Hide 'N Seek was designed to maintain itself in the host's system indefinitely. When it was first released, Hide 'N Seek primarily targeted certain routers and internet-enabled security cameras; however, it has now began targeting digital video recorders, database servers, and most recently, smart home hubs.
Hide 'N Seek's communication capabilities are also more advanced than previous botnets. Previous botnets relied on existing communications protocols to communicate with other another, but Hide 'N Seek uses a custom-built peer-to-peer system to communicate. This advancement allows Hide 'N Seek to spread more rapidly than previous botnets.
Hide 'N Seek is also capable of extracting a device owner's personal information (i.e. name, address, e-mail, telephone numbers, etc.) whereas previous botnets were not. Most importantly, Hide 'N Seek is consistently updated to increase its infection rate, decrease its detection probability, and bypass any security measures designed to detect and remove it from the system. This modularity has proved to be Hide 'N Seek's greatest strength.
Protecting Against Hide 'N Seek and Other Botnets
While many of the precautions will undoubtedly come from the device manufactures vis-à-vis software programming and updates, homebuilders can still take some precautions to protect their customers.
- When selecting a smart home system to incorporate into a home's construction, be sure to evaluate its security features including, but not limited to its: wireless connectivity, password/passphrase requirements, interconnectedness with other IoT devices, etc. Third-party reviews from tech-oriented outlets will likely have useful information on a device's security measures, vulnerabilities, and any recent security compromises.
- Be vigilant in installing any eQ-3 smart home systems. The extent of the damage caused by Hide 'N Seek botnet remains unknown, as does damage from other potentially-infected technology. Thus, it may be prudent to avoid installing any eQ-3 device until it becomes evident that the threat has been neutralized and all security vulnerabilities have been remedied.
- If a builder uses technology other than eQ-3, precautions must be taken. Ensure that technology providers are thoroughly researched. It is also recommended to include strong contractual indemnity provisions, and require vendors to carry cyber-specific insurance policies.
- Homebuilders should consider purchasing their own stand alone cyber liability policies as a safety net, should potential exposure arise.
Scott Satkin and Amtoj Randhawa are associates in the Cybersecurity group of Newmeyer & Dillion. Focused on helping clients navigate the legal dispute implications of cybersecurity, they advise businesses on implementing and adopting proactive measures to prevent and neutralize cybersecurity threats. For questions on how they can help, contact Scott at scott.satkin@ndlf.com and Amtoj at amtoj.randhawa@ndlf.com.
Read the court decisionRead the full story...Reprinted courtesy of