The document discusses two issues regarding data stored on employee-owned mobile devices in litigation discovery: 1) Courts have ordered companies to obtain and produce data, like emails and text messages, from employees' personal devices if the company's BYOD policy states that such data is company property; 2) Data exchanged between employees and other parties through personal devices, like text messages, could also be within a company's control and obligate them to preserve and produce such data if relevant to litigation. The document advises companies to establish clear policies for collecting and preserving all potentially relevant electronically stored data when litigation is anticipated.
P.F. Chang's suffered losses after a data breach when its insurer denied coverage for PCI-DSS fines imposed by its payment processor. A court upheld the denial, finding the fines were contractual obligations excluded from coverage. This case highlights the need to carefully review cyber policies to ensure PCI-DSS assessments arising from merchant agreements are explicitly covered, as contractual liabilities are generally excluded and this can be a significant source of loss. Policies may also limit PCI-DSS coverage in various ways, so close examination is required to understand available coverage for these assessments.
Business Liability Policy Requires Insurer to Defend Defamation and Business ...NationalUnderwriter
The document summarizes a court case where an insurer, State Farm, was found to have a duty to defend an insured, Franklin Center, against claims arising from articles the Franklin Center published on its website. The court determined the claims alleged covered "personal and advertising injury" under the policy and did not fall under exclusions banning coverage for insureds whose business is publishing. While Franklin Center engaged in publishing by posting articles online, that was incidental to its actual business, so the exclusion did not apply. The case shows insurers have a broad duty to defend when claims could fall within coverage.
1. A BYOD policy allows employees to use personal devices for work but raises issues around balancing employee privacy and corporate data security needs.
2. Recent court cases find employees have a reasonable expectation of privacy for personal information on their devices if the company policy allows personal use and they take steps to safeguard private information.
3. Companies can monitor business-related information stored on or sent through corporate servers but likely cannot access personal communications like texts and social media. To minimize liability, companies should have clear, transparent BYOD policies and limit monitoring to work-related matters stored on company servers.
eth 321,uop eth 321 new,uop eth 321 new complete course,uop eth 321 new entire course,uop eth 321 new week 1,uop eth 321 new week2,uop eth 321 new week 3,uop eth 321 new week 4,uop eth 321 new week 5, uop eth 321 new week 6,uop eth 321 new tutorials,uop eth 321 new assignments,eth 321 help
This document summarizes a court case regarding non-compete agreements. It discusses the key issues in the case of Whelan Security Co. v. Kennebrew, in which an ex-employee of Whelan Security set up a competing business in violation of his non-compete agreement. The court found that the geographic and customer restrictions in the non-compete agreement were overly broad. The summary examines the implications of this case for how courts evaluate different types of restrictions in non-compete agreements, particularly geographic restrictions versus customer-specific restrictions.
The document is a study guide for ETH 321's final exam that provides 30 multiple choice questions and answers about business law topics like contracts, intellectual property, antitrust law, and alternative dispute resolution. It covers concepts such as the roles of the grand jury and Securities and Exchange Commission, examples of bilateral contracts, and exceptions to antitrust laws like the Noerr-Pennington doctrine. The guide is intended to help students prepare for assessments on legal issues commonly found in business and commerce.
http://finishedexams.com/homework_text.php?cat=2633
Immediate access to solutions for ENTIRE COURSES, FINAL EXAMS and HOMEWORKS “RATED A+" - Without Registration!
P.F. Chang's suffered losses after a data breach when its insurer denied coverage for PCI-DSS fines imposed by its payment processor. A court upheld the denial, finding the fines were contractual obligations excluded from coverage. This case highlights the need to carefully review cyber policies to ensure PCI-DSS assessments arising from merchant agreements are explicitly covered, as contractual liabilities are generally excluded and this can be a significant source of loss. Policies may also limit PCI-DSS coverage in various ways, so close examination is required to understand available coverage for these assessments.
Business Liability Policy Requires Insurer to Defend Defamation and Business ...NationalUnderwriter
The document summarizes a court case where an insurer, State Farm, was found to have a duty to defend an insured, Franklin Center, against claims arising from articles the Franklin Center published on its website. The court determined the claims alleged covered "personal and advertising injury" under the policy and did not fall under exclusions banning coverage for insureds whose business is publishing. While Franklin Center engaged in publishing by posting articles online, that was incidental to its actual business, so the exclusion did not apply. The case shows insurers have a broad duty to defend when claims could fall within coverage.
1. A BYOD policy allows employees to use personal devices for work but raises issues around balancing employee privacy and corporate data security needs.
2. Recent court cases find employees have a reasonable expectation of privacy for personal information on their devices if the company policy allows personal use and they take steps to safeguard private information.
3. Companies can monitor business-related information stored on or sent through corporate servers but likely cannot access personal communications like texts and social media. To minimize liability, companies should have clear, transparent BYOD policies and limit monitoring to work-related matters stored on company servers.
eth 321,uop eth 321 new,uop eth 321 new complete course,uop eth 321 new entire course,uop eth 321 new week 1,uop eth 321 new week2,uop eth 321 new week 3,uop eth 321 new week 4,uop eth 321 new week 5, uop eth 321 new week 6,uop eth 321 new tutorials,uop eth 321 new assignments,eth 321 help
This document summarizes a court case regarding non-compete agreements. It discusses the key issues in the case of Whelan Security Co. v. Kennebrew, in which an ex-employee of Whelan Security set up a competing business in violation of his non-compete agreement. The court found that the geographic and customer restrictions in the non-compete agreement were overly broad. The summary examines the implications of this case for how courts evaluate different types of restrictions in non-compete agreements, particularly geographic restrictions versus customer-specific restrictions.
The document is a study guide for ETH 321's final exam that provides 30 multiple choice questions and answers about business law topics like contracts, intellectual property, antitrust law, and alternative dispute resolution. It covers concepts such as the roles of the grand jury and Securities and Exchange Commission, examples of bilateral contracts, and exceptions to antitrust laws like the Noerr-Pennington doctrine. The guide is intended to help students prepare for assessments on legal issues commonly found in business and commerce.
http://finishedexams.com/homework_text.php?cat=2633
Immediate access to solutions for ENTIRE COURSES, FINAL EXAMS and HOMEWORKS “RATED A+" - Without Registration!
This newsletter discusses two cases related to insurance coverage. The first case involved a wrongful death claim where the insurer settled with one heir but was later sued by other unknown heirs. The court found the insurer was not protected by settling pre-litigation. Insurers should use genealogists to identify all heirs or have claimants file a lawsuit to receive protection. The second article summarizes various cyber risk insurance policies available to businesses to cover losses from hacking or security breaches. It notes various state and federal regulations regarding notification of privacy breaches.
This document summarizes recent employment law cases from the United States Supreme Court and the National Labor Relations Board.
1) The Supreme Court upheld a state law mandating employer use of E-Verify and found that oral complaints are protected under the FLSA's anti-retaliation provision. Additionally, the Court enforced arbitration agreements prohibiting class actions.
2) An NLRB decision found that mandatory arbitration clauses cannot restrict employees' rights to collective or class actions. The NLRB also required employers to post notices informing employees of their NLRA rights. New NLRB rules make it easier for unions to organize small employee groups.
3) The document discusses the implications of these rulings, including states' ability
Lack of Reasonable Privacy Expectation in Corporate EmailAndres Baytelman
The court ruled that an employee did not have a reasonable expectation of privacy over communications sent through their employer's email system. The court applied a 4-part test to determine if the employee's expectation of privacy was reasonable, considering the employer had an email policy that banned personal use and allowed access to emails for business reasons. As the employer met all parts of the test, the court ordered the production of emails between the employee and his wife. The case serves as a reminder for companies to have clear and publicized email policies regarding privacy and monitoring.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union.
The author discusses three instances where companies were "faking" their PCI compliance status by falsely claiming to be compliant when they were not. This allowed the companies to avoid the work required to be truly compliant but put customers' credit card data at risk. Faking compliance is fraudulent and can result in legal and financial consequences if uncovered. While difficult, being truly PCI compliant is important to protect customers and maintain trust in the PCI standards.
This article discusses the growing risk of cyber breaches for small and medium sized businesses and the importance of cyber insurance. It makes three key points:
1) Less than 6% of small/medium businesses purchase cyber insurance despite increasing risks of data breaches.
2) When developing cyber endorsements, insurers need to consider coverage limits, included services, and risk mitigation tools to help businesses prevent and respond to breaches.
3) The costs of data breaches, such as notification, forensic audits, and lawsuits, average tens of thousands of dollars per breach, demonstrating the need for higher insurance limits.
Cyber risk related to information security is growing. A potentially huge exposure for transportation companies is the personal data of their current and prospective drivers.
Canada's Anti-Spam Legislation (CASL) regulates commercial electronic messages sent to individuals in Canada. It prohibits unsolicited commercial emails and text messages and requires express consent. The document discusses CASL's strict rules on obtaining consent, exceptions, penalties for non-compliance, and the TrustedForm solution for independently verifying consumer consent online through digital certificates. CASL penalties can include fines of up to $10 million per day and allows for private lawsuits seeking damages.
CI Breaks down the new 2013 rules for CFPB:
The Consumer Financial Protection Bureau (CFPB) now has primary rule making authority over the Federal Fair Credit Reporting Act.
New forms are required for the effective date of January 1, 2013.
On April 25th, the Equal Employment Opportunity Commission issued new “enforcement guidance on the consideration of arrest and conviction records in employment decisions under Title VII of the Civil Rights Act of 1964.”
This is the first guidance on this topic issued by the EEOC in more than 20 years. It reflects the EEOC’s recent litigation trend of trying to limit employers’ use of criminal records in making employment decisions.
D&O Insurance - Become a Knowledgeable BuyerCraig Tappel
When serving as a board member for a corporation or non-profit, question the Management Liability policy limits and the coverage. They must be sufficient to protect both the entity and your personal assets.
This document discusses contractual obligations that companies take on to notify customers and pay costs associated with a data breach when working with third party vendors. There are two common types of obligations: 1) To make the client company whole for any costs associated with a breach, including notification and credit monitoring. However, insurance policies may not cover all costs and the vendor loses negotiating power. 2) To directly notify customers on behalf of the client company. But most policies only cover notification required by law, not contracts. Not all policies cover costs associated with contractual notification obligations. Insureds need to carefully review policies and obligations to ensure coverage aligns with contractual responsibilities in the event of a breach.
Claims-Made Policies May Cover Claims Submitted Outside the Reporting PeriodNationalUnderwriter
Claims-Made Policies May Cover Claims Submitted Outside the Reporting Period.
As a rule, liability insurance policies contain a condition requiring timely notice of a claim against the insured, so that the insurer has an opportunity to adequately investigate and defend the claim. A recurring issue is what happens when notice is not timely. Does the insured lose coverage, automatically, or only when the insurer is prejudiced by the late notice?
The answer can vary depending on what state’s law applies – in Wisconsin, this issue is seemingly answered not as much by policy language or case law but by two different statutes, Wis. Stat. §§ 631.81 and 632.26, each of which expressly states than an insured loses coverage only where the insurer is “prejudiced” by late notice.
Business interruption insurance provides coverage for financial losses businesses incur due to indirect or consequential losses from events that cause business interruptions, even if there is only minor direct property damage. It has become especially important with modern automated businesses that are vulnerable to interruptions. Coverage includes lost business income and extra expenses to avoid downtime, such as temporary locations. Claims made policies require claims be reported during the policy period, so renewals require caution to avoid lapses in coverage. Workers' compensation generally does not cover independent contractors, but their injuries may be covered under the client's policy if the contractor has no insurance. The terrorism risk insurance program provides federal backing for terrorism coverage purchased by policyholders.
This article discusses the problems that may arise when a blanket additional insured endorsement is attached to the commercial general liability coverage form.
The reason for blanket additional insured endorsements for use with commercial general liability coverage forms is to eliminate the insurer’s necessity of having to issue individual endorsements (or in the insurance vernacular, scheduled endorsements). That, in fact, is the only advantage because the needs of additional insureds vary and so too, does the nature of the coverage. In other words, a blanket endorsement is not necessarily suited for all persons or organizations requiring additional insured coverage.
An erroneous point about the blanket additional insured endorsement is that it is broad in scope. That is not true! They can be broad if they are amended to fit the needs of a particular class of risks. These endorsements, however, usually are very limited. Another point about the blanket additional insured endorsement is that it will contain more verbiage than a scheduled endorsement, because underwriters will not be underwriting each additional insured request, and out of necessity, must add provisions such as a professional liability exclusion whether such an exposure exists or not.
Legal Issues Impacting Data Center Owners, Operators & Usersjyates
MMM’s goal is to work with data center owners, operators and users to identify key legal issues and their related claims, and to provide ways to minimize liability.
Promptly reporting claims to your insurer provides several benefits: it helps ensure coverage is available to pay losses and avoid out-of-pocket costs; studies show early reporting correlates with lower claim costs and faster settlements, reducing premiums and boosting profits; and early response lessens litigation risks. Policies require notifying insurers of occurrences and claims to allow investigation and reserving; failure to do so could jeopardize coverage. While notice should be given reasonably promptly based on circumstances, delayed notice may void coverage unless prejudice to the insurer is shown. Early reporting within 24 hours is strongly recommended and designating reporting responsibilities can reduce late notices.
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit by Lynda Bennett
2014 ended almost the same way that it began for most companies – having concerns about cyber security and hackers. At the beginning of the year, the news cycle was focused on breaches that took place in the consumer product space as Target, Michael’s, Neiman Marcus, and Home Depot worked fast and furious to address breaches that led to concerns about a massive amount of credit card information possibly being “in the open.” Later in the year, we learned that corporate giants like JPMorgan Chase and Apple were not immune from cyber security breaches as still more personally identifiable information and very personal photographs were released into the public domain. Finally, as 2014 drew to a close, the entertainment industry was further rocked by the cyber-attack on Sony Corp., which led to even broader concerns about national security and terrorist threats.
Legal Issues Impacting Data Center Owners, Operators and UsersMMMTechLaw
The document discusses key legal issues facing data center owners, operators, and users, including contracts, tort liability, products liability, regulatory compliance, privacy, security breaches, and post-hacking issues. It summarizes recent court cases involving data breaches and security issues. The document aims to help data centers identify risks and minimize liability through best practices like reviewing insurance policies and compliance with breach notification laws.
Insurance claim settlement in china by daxue consultingDaxue Consulting
With support from Asian Risks Management Services Co. Ltd. (ARMS) we are happy to share our new report on insurance claim settlement in China.
Overview of the insurance claim settlement market, Chinese insurance companies boast high claim settlements rates and quick resolutions. However, if it’s true for most insurance B2C policies, more complex insurance contracts often require longer time periods to settle and are more prone to claim failure.
This newsletter discusses two cases related to insurance coverage. The first case involved a wrongful death claim where the insurer settled with one heir but was later sued by other unknown heirs. The court found the insurer was not protected by settling pre-litigation. Insurers should use genealogists to identify all heirs or have claimants file a lawsuit to receive protection. The second article summarizes various cyber risk insurance policies available to businesses to cover losses from hacking or security breaches. It notes various state and federal regulations regarding notification of privacy breaches.
This document summarizes recent employment law cases from the United States Supreme Court and the National Labor Relations Board.
1) The Supreme Court upheld a state law mandating employer use of E-Verify and found that oral complaints are protected under the FLSA's anti-retaliation provision. Additionally, the Court enforced arbitration agreements prohibiting class actions.
2) An NLRB decision found that mandatory arbitration clauses cannot restrict employees' rights to collective or class actions. The NLRB also required employers to post notices informing employees of their NLRA rights. New NLRB rules make it easier for unions to organize small employee groups.
3) The document discusses the implications of these rulings, including states' ability
Lack of Reasonable Privacy Expectation in Corporate EmailAndres Baytelman
The court ruled that an employee did not have a reasonable expectation of privacy over communications sent through their employer's email system. The court applied a 4-part test to determine if the employee's expectation of privacy was reasonable, considering the employer had an email policy that banned personal use and allowed access to emails for business reasons. As the employer met all parts of the test, the court ordered the production of emails between the employee and his wife. The case serves as a reminder for companies to have clear and publicized email policies regarding privacy and monitoring.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union.
The author discusses three instances where companies were "faking" their PCI compliance status by falsely claiming to be compliant when they were not. This allowed the companies to avoid the work required to be truly compliant but put customers' credit card data at risk. Faking compliance is fraudulent and can result in legal and financial consequences if uncovered. While difficult, being truly PCI compliant is important to protect customers and maintain trust in the PCI standards.
This article discusses the growing risk of cyber breaches for small and medium sized businesses and the importance of cyber insurance. It makes three key points:
1) Less than 6% of small/medium businesses purchase cyber insurance despite increasing risks of data breaches.
2) When developing cyber endorsements, insurers need to consider coverage limits, included services, and risk mitigation tools to help businesses prevent and respond to breaches.
3) The costs of data breaches, such as notification, forensic audits, and lawsuits, average tens of thousands of dollars per breach, demonstrating the need for higher insurance limits.
Cyber risk related to information security is growing. A potentially huge exposure for transportation companies is the personal data of their current and prospective drivers.
Canada's Anti-Spam Legislation (CASL) regulates commercial electronic messages sent to individuals in Canada. It prohibits unsolicited commercial emails and text messages and requires express consent. The document discusses CASL's strict rules on obtaining consent, exceptions, penalties for non-compliance, and the TrustedForm solution for independently verifying consumer consent online through digital certificates. CASL penalties can include fines of up to $10 million per day and allows for private lawsuits seeking damages.
CI Breaks down the new 2013 rules for CFPB:
The Consumer Financial Protection Bureau (CFPB) now has primary rule making authority over the Federal Fair Credit Reporting Act.
New forms are required for the effective date of January 1, 2013.
On April 25th, the Equal Employment Opportunity Commission issued new “enforcement guidance on the consideration of arrest and conviction records in employment decisions under Title VII of the Civil Rights Act of 1964.”
This is the first guidance on this topic issued by the EEOC in more than 20 years. It reflects the EEOC’s recent litigation trend of trying to limit employers’ use of criminal records in making employment decisions.
D&O Insurance - Become a Knowledgeable BuyerCraig Tappel
When serving as a board member for a corporation or non-profit, question the Management Liability policy limits and the coverage. They must be sufficient to protect both the entity and your personal assets.
This document discusses contractual obligations that companies take on to notify customers and pay costs associated with a data breach when working with third party vendors. There are two common types of obligations: 1) To make the client company whole for any costs associated with a breach, including notification and credit monitoring. However, insurance policies may not cover all costs and the vendor loses negotiating power. 2) To directly notify customers on behalf of the client company. But most policies only cover notification required by law, not contracts. Not all policies cover costs associated with contractual notification obligations. Insureds need to carefully review policies and obligations to ensure coverage aligns with contractual responsibilities in the event of a breach.
Claims-Made Policies May Cover Claims Submitted Outside the Reporting PeriodNationalUnderwriter
Claims-Made Policies May Cover Claims Submitted Outside the Reporting Period.
As a rule, liability insurance policies contain a condition requiring timely notice of a claim against the insured, so that the insurer has an opportunity to adequately investigate and defend the claim. A recurring issue is what happens when notice is not timely. Does the insured lose coverage, automatically, or only when the insurer is prejudiced by the late notice?
The answer can vary depending on what state’s law applies – in Wisconsin, this issue is seemingly answered not as much by policy language or case law but by two different statutes, Wis. Stat. §§ 631.81 and 632.26, each of which expressly states than an insured loses coverage only where the insurer is “prejudiced” by late notice.
Business interruption insurance provides coverage for financial losses businesses incur due to indirect or consequential losses from events that cause business interruptions, even if there is only minor direct property damage. It has become especially important with modern automated businesses that are vulnerable to interruptions. Coverage includes lost business income and extra expenses to avoid downtime, such as temporary locations. Claims made policies require claims be reported during the policy period, so renewals require caution to avoid lapses in coverage. Workers' compensation generally does not cover independent contractors, but their injuries may be covered under the client's policy if the contractor has no insurance. The terrorism risk insurance program provides federal backing for terrorism coverage purchased by policyholders.
This article discusses the problems that may arise when a blanket additional insured endorsement is attached to the commercial general liability coverage form.
The reason for blanket additional insured endorsements for use with commercial general liability coverage forms is to eliminate the insurer’s necessity of having to issue individual endorsements (or in the insurance vernacular, scheduled endorsements). That, in fact, is the only advantage because the needs of additional insureds vary and so too, does the nature of the coverage. In other words, a blanket endorsement is not necessarily suited for all persons or organizations requiring additional insured coverage.
An erroneous point about the blanket additional insured endorsement is that it is broad in scope. That is not true! They can be broad if they are amended to fit the needs of a particular class of risks. These endorsements, however, usually are very limited. Another point about the blanket additional insured endorsement is that it will contain more verbiage than a scheduled endorsement, because underwriters will not be underwriting each additional insured request, and out of necessity, must add provisions such as a professional liability exclusion whether such an exposure exists or not.
Legal Issues Impacting Data Center Owners, Operators & Usersjyates
MMM’s goal is to work with data center owners, operators and users to identify key legal issues and their related claims, and to provide ways to minimize liability.
Promptly reporting claims to your insurer provides several benefits: it helps ensure coverage is available to pay losses and avoid out-of-pocket costs; studies show early reporting correlates with lower claim costs and faster settlements, reducing premiums and boosting profits; and early response lessens litigation risks. Policies require notifying insurers of occurrences and claims to allow investigation and reserving; failure to do so could jeopardize coverage. While notice should be given reasonably promptly based on circumstances, delayed notice may void coverage unless prejudice to the insurer is shown. Early reporting within 24 hours is strongly recommended and designating reporting responsibilities can reduce late notices.
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditNationalUnderwriter
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit by Lynda Bennett
2014 ended almost the same way that it began for most companies – having concerns about cyber security and hackers. At the beginning of the year, the news cycle was focused on breaches that took place in the consumer product space as Target, Michael’s, Neiman Marcus, and Home Depot worked fast and furious to address breaches that led to concerns about a massive amount of credit card information possibly being “in the open.” Later in the year, we learned that corporate giants like JPMorgan Chase and Apple were not immune from cyber security breaches as still more personally identifiable information and very personal photographs were released into the public domain. Finally, as 2014 drew to a close, the entertainment industry was further rocked by the cyber-attack on Sony Corp., which led to even broader concerns about national security and terrorist threats.
Legal Issues Impacting Data Center Owners, Operators and UsersMMMTechLaw
The document discusses key legal issues facing data center owners, operators, and users, including contracts, tort liability, products liability, regulatory compliance, privacy, security breaches, and post-hacking issues. It summarizes recent court cases involving data breaches and security issues. The document aims to help data centers identify risks and minimize liability through best practices like reviewing insurance policies and compliance with breach notification laws.
Insurance claim settlement in china by daxue consultingDaxue Consulting
With support from Asian Risks Management Services Co. Ltd. (ARMS) we are happy to share our new report on insurance claim settlement in China.
Overview of the insurance claim settlement market, Chinese insurance companies boast high claim settlements rates and quick resolutions. However, if it’s true for most insurance B2C policies, more complex insurance contracts often require longer time periods to settle and are more prone to claim failure.
Home Inspector's Insurance & Risk Management - July 19, 2013Gerald Brunker
Home Inspector professional liability, general liability and other applicable insurances for home inspectors. Risk management tips and hints and home inspector claim information.
Business interruption insurance provides coverage for financial losses businesses incur due to indirect or consequential losses from events that cause operational disruptions, even if there is no direct physical damage to property. It has two main components - business income coverage, which covers lost profits and operating expenses, and extra expense coverage, which covers additional costs like temporary locations that allow businesses to continue operating. Claims made policies, unlike occurrence policies, only provide coverage if a claim is first made and reported during the active policy period. Renewing claims made policies requires caution to avoid coverage gaps. Workers compensation rules aim to universally cover employee injuries but challenges arise with independent contractors who are not legally considered employees.
The document provides an overview of the extended warranty industry in the United States. It discusses the structure of the industry, with extended warranties being offered by either the retailer, manufacturer, or a third party warranty administrator. It estimates the size of the US extended warranty market was $39.5 billion in 2014, with automobiles making up the largest segment. The industry has experienced average annual growth of over 8% while overall US economic growth has been around 2.2% annually. Common products covered by extended warranties include automobiles, mobile phones, consumer electronics, appliances, and home systems.
This document summarizes the Summer 2016 edition of Willis Towers Watson's Cyber Claims Brief publication. It discusses potential liability issues that may arise when companies are directed by government authorities to take action or not take action related to a cybersecurity event. It also examines the growing threat of cyber extortion, particularly ransomware attacks, and how companies can help mitigate these threats. Finally, it provides an analysis of the recent EU General Data Protection Regulation and EU-US Privacy Shield agreement.
Three insurance claims scenarios every agent should share with their insured AMT Warranty
Insurance companies come across all kinds of claim scenarios. In this article, we will discuss three different scenarios and the coverages that apply (or may not apply) to them:
Slip and fall incident
FDIC (Federal Deposit Insurance Commission) investigation
EEOC (Equal Employment Opportunity Commission) charge
Strategic Planning | Liability Insurance for the Self EmployedVirtualBusiness
Being self-employed exposes you to greater legal responsibilities than working for a company. You are personally liable for any damage or injuries caused by your business actions or property. Public liability insurance protects you against legal claims from third parties for personal injury or property damage. It is an essential protection for self-employed individuals and small businesses that could prevent financial ruin from lawsuits. The policy covers your legal defense costs, which many view as the most important aspect.
Who are today's consumers of Legal Expenses Insurance?Demi Edmunds
Jacqueline Harvey talks about who today's consumers of legal expenses insurance are, in short - An increasing range of those using dispute resolution services.
Self-Insured Retentions Part 2: An Examination of the Uses and Problems (from...NationalUnderwriter
This second and concluding part of the discussion on self-insured retentions first itemizes the points that should be
considered when either drafting or accepting SIRs. The discussion then addresses some additional problem areas not only with self-insured retentions having to do with primary liability policies, but also with the SIR feature of umbrella policies. It is not unusual, furthermore, for litigants, among others, to confuse deductibles with self-insured retentions, and there are differences, as one case discussed points out. In light of the fact that self-insured retentions also are growing, it also is important that parties to a contract are informed of their existence. To not do so, could end up with the accusation of failure to procure the proper insurance and, of course, such a breach is not covered by liability policies. It is for this reason that perhaps insurance certificates should be amended to insert room to notify (and warn) certificate holders of an SIR existence.
Similar to Cohen & Grigsby Commercial & Complex Litigation Newsletter - Hot Topics that Impact Your Business - Issue One (20)
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Receivership and liquidation Accounts
Being a Paper Presented at Business Recovery and Insolvency Practitioners Association of Nigeria (BRIPAN) on Friday, August 18, 2023.
The Work Permit for Self-Employed Persons in Italy
Cohen & Grigsby Commercial & Complex Litigation Newsletter - Hot Topics that Impact Your Business - Issue One
1. ISSUE ONE
uIN THIS ISSUE
ISSUE ONE
Commercial &Complex Litigation
DATA STORED ON EMPLOYEE-OWNED MOBILE DEVICES
IS INCREASINGLY RELEVANT IN LITIGATION DISCOVERY
Morgan J. Hanson
Chair
Litigation Service Sector
412-297-4996
mhanson@cohenlaw.com
Ingrid A. Böhme
Director
Commercial & Complex Litigation
412-297-4615
ibohme@cohenlaw.com
Richard A. Ejzak
Director
Insurance Recovery
412-297-4876
rejzak@cohenlaw.com
Christina Manfredi McKinley
Director
Commercial & Complex Litigation
412-297-4772
cmckinley@cohenlaw.com
Most businesses understand that relevant
electronically stored information found on
company-owned hardware and software
may become key evidence if the company
finds itself embroiled in a lawsuit. Email, for
instance, chronicles the daily activities of
a business both internally and externally
and can prove critical to the success of a
party’s claims or defenses. It may come as a
surprise to some to learn that collecting and
producing data from an employee’s personal
mobile device may also be the responsibility
of the company as a party to litigation.
Increasingly, courts are examining whether
they should require a party to produce
data such as text messages and emails
from its employees’or agents’personal
cell phones and, on the other hand, whether
the litigating company can be sanctioned
for the failure to preserve such data.
Federal courts, including those in
Pennsylvania, have addressed bring-your-
own-device (“BYOD”) policies through which
companies allow or require employees to
use personal mobile devices to transmit
work-related information. In several of
these cases, courts have relied on formal
and informal company policies as the
basis to order companies to obtain and
produce data from a mobile device owned
by an employee. For example, in adopting
the recommendation of a special master,
Judge Schwab in the Western District of
Pennsylvania concluded that the plaintiff
company must obtain and produce data
from certain of its employees’cell phones.1
The company’s BYOD program specifically
stated that information and emails on the
devices were the company’s property.
Accordingly, the court found that the
company had custody and control over
company emails and text messages on the
devices and, as a party to the suit, could be
ordered to produce any such responsive
data from employees’mobile devices.
Another area of concern is data that
employees send neither through company
servers nor on company devices, such
as text messages sent on BYO devices.
If that data is relevant to a company’s
litigation, consideration must be given
to what obligation, if any, the company
has to obtain, preserve, and produce
it. By way of example, a federal court in
New York addressed a situation where a
non-party screenwriter acquired a new
mobile phone, losing his text messages
during the process.2
The screenwriter had
exchanged a significant number of text
messages with an individual defendant
as part of the transaction leading to the
lawsuit. Because the text messages had
been deleted upon the acquisition of the
new device and could not be produced,
the plaintiff requested and received
spoliation sanctions in the form of an
adverse inference against the film studio
Data Stored on Employee-
owned Mobile Devices Is
Increasingly Relevant in Litigation
Discovery.......................................1-2
Additional Insureds –
Who Are They and How Do
They Get Coverage?...................2-3
Due Process Matters, Pennsylvania’s
Corporate Registration Statute
Notwithstanding............................3
(continued on next page)
2. - 2 -
(continued from previous page)
defendant. The court concluded that the film
studio had control over the text messages
as a matter of“common sense”because the
screenwriter worked closely with the film
studio, had a financial interest in the film
at issue, participated in the suit by being
deposed by the plaintiff, and had a financial
interest in the outcome of the litigation.
The potentially relevant pool of data subject
to discovery in litigation has expanded.
Accordingly, companies must establish
proactive policies and take the appropriate
collection and preservation steps when
litigation is reasonably anticipated—not
just of paper documents, emails, and office
files, but also of text messages, app data,
social media messages, and other data over
which the company may be deemed to have
possession, custody, or control.
1
See H.J. Heinz Co. v. Starr Surplus Lines Ins. Co., No.
2:15-CV-00631-AJS, 2015 WL 12791338, at *4
(W.D. Pa. July 28, 2015), report and recommendation
adopted, No. 2:15-CV-00631-AJS, 2015 WL 12792025
(W.D. Pa. July 31, 2015).
2
Ronnie Van Zant, Inc. v. Pyle, 270 F. Supp. 3d 656, 656-68
(S.D.N.Y. 2017).
ADDITIONAL INSUREDS –
WHO ARE THEY AND HOW
DO THEY GET COVERAGE?
Who is entitled to coverage under an
insurance policy? The question is simple,
but the answer sometimes is not. Obviously,
any company that the policy identifies
as a“Named Insured”is covered, as are
companies and individuals that the policy
specifically identifies as insureds, either by
name or by their connection to the named
insured (such as subsidiary companies,
shareholders or officers/directors of the
named insured).
But what about companies that are not
identified in the policy? For example,
a subcontractor might have to extend
coverage under its policy to a general
contractor or owner as a condition for
obtaining work. Or a tenant might have
to add a landlord to its policy under
the terms of a lease. In those situations,
the subcontractor or tenant can extend
coverage to additional parties by obtaining
an endorsement from the insurer. If drafted
properly, the endorsement should eliminate
or at least minimize any uncertainty about
the coverage the additional party will receive
under the policy.
The picture is less clear if there is not an
endorsement specifically naming a party
as an additional insured. Liability policies
frequently contain two provisions – the
definition of the“Insured”and the so-
called vendor endorsement – that can
extend coverage automatically to parties
unrelated to the policyholder under certain
circumstances.
DEFINITION OF THE“INSURED”
When defining who is an“Insured,”liability
policies often include any company for
whom the policyholder has agreed by
contract to provide coverage. Because such
a provision relies on the terms of a contract
between the policyholder and an unrelated
third party, it is extremely helpful if the
contract clearly identifies the limits and
scope of coverage that is to be provided.
Courts have enforced contracts that include
such terms.
When a contract requires a party to provide
insurance for another party (as in the
subcontractor/general contractor or tenant/
landlord scenarios mentioned above), the
contract also might require the party to
provide a certificate of insurance to the other
party. Many certificates expressly state that
they are issued as a matter of information
only and do not confer any rights on the
holder. Notwithstanding this disclaimer,
the coverage available to a party who holds
a certificate of insurance depends on the
language in the certificate, the facts of the
case and the jurisdiction in which the case
is pending.
Contracts that require a policyholder
to provide insurance coverage for
another party also commonly require the
policyholder to indemnify the other party.
It is important for the parties to consider
whether they want to synchronize the two
requirements so that the duty to indemnify
is coextensive with the duty to provide
coverage. For example, if the contract limits
the duty to indemnify to liabilities arising
solely from the conduct of the policyholder,
the parties might (or might not) want the
contract to impose the same limit on the
insurance coverage the policyholder must
provide to the other party.
VENDOR ENDORSEMENT
The vendor endorsement typically
amends the policy definition of“Insured”
to include distributors or wholesalers of
a manufacturer. Where a manufacturer’s
liability policy includes a vendor
endorsement, a vendor might be entitled
to coverage under the policy even if the
manufacturer is not contractually required
to provide insurance for the vendor.
Because coverage can apply automatically
to vendors without the insurer’s knowledge,
the vendor endorsement usually contains
language that purports to limit the coverage
available to the vendor. For example, a
standard vendor endorsement states that
coverage does not apply to bodily injury
or property damage arising out of changes
the vendor makes to the condition of the
manufacturer’s product.
The existence and scope of insurance
coverage can dramatically alter the fortunes
of policyholders and the companies with
whom they interact either through contract
or by virtue of vendor relationships. For
Ingrid A. Böhme
Director
Commercial & Complex
Litigation
412-297-4615
ibohme@cohenlaw.com
(continued on next page)
3. - 3 -
that reason, it is important to be aware of
insurance provisions that can automatically
extend coverage to parties who are not
named in the policy.
DUE PROCESS MATTERS,
PENNSYLVANIA’S
CORPORATE
REGISTRATION STATUTE
NOTWITHSTANDING
In a recent opinion, Judge Arnold New of the
Philadelphia County Court of Common Pleas
rejected the argument that Pennsylvania’s
unique corporate registration statute
provides Pennsylvania courts with general
jurisdiction over out-of-state companies.
The potential ramifications of this ruling are
significant. For plaintiffs, Judge New’s ruling
guts the broad jurisdictional hook on which
they frequently rely; while for companies,
they might no longer face coercive
jurisdiction as a condition of doing
business in the Commonwealth.
Courts have long held that foreign
companies may consent to a state court’s
jurisdiction (“consent jurisdiction”).
Pennsylvania’s general corporate registration
law is unique, however, in that it requires
out-of-state companies to submit to general
personal jurisdiction (i.e., consent to suit in
the state for any type of action, unrelated
to the company’s business dealings with
the state) as a condition of doing business
in Pennsylvania. See 15 Pa. C.S. §§ 411(a),
102(a), 411(b); 42 Pa. C.S. § 5301.
Putting aside momentarily the concept
of consent jurisdiction, a recent wave of
rulings, particularly in the wake of Supreme
Court decisions, rein in state jurisdictional
statutes that provide for general jurisdiction
over a foreign business merely because
it has interactions within a state. These
recent rulings have curbed those state
laws by tethering general jurisdiction over
companies to states in which the company
either maintains its principal place of
business or is incorporated—where it is
“at home.”
Judge New’s ruling is notable because it ties
together the concepts of consent jurisdiction
and general jurisdiction. Judge New
determined that consent as a condition of
doing business is not really consent at all:“By
wrapping general jurisdiction in the cloak of
consent, Pennsylvania’s mandated corporate
registration attempts to do exactly what the
United States Supreme Court prohibited.”
Judge New’s ruling sets the stage for an
interesting appellate battle. While the
ruling appears to be consistent with federal
precedent regarding general jurisdiction, its
characterization of consent jurisdiction—
and specifically, the type of consent
jurisdiction mandated by Pennsylvania’s
corporate registration statute—as violative
of the Due Process Clause of the U.S.
Constitution is a novel interpretation that
has potential far-reaching consequences
both for plaintiffs seeking to sue foreign
companies in Pennsylvania and for foreign
companies seeking to do business in
Pennsylvania without subjecting themselves
to significant legal exposure for conduct
unrelated to their business activities.
The case is Mallory v. Norfolk Southern
Railway Co., No. 1961 (May 30, 2018).
Richard A. Ejzak
Director
Insurance Recovery
412-297-4876
rejzak@cohenlaw.com
Christina Manfredi
McKinley
Director
Commercial & Complex
Litigation
412-297-4772
cmckinley@cohenlaw.com
*
FOR EMAIL UPDATES
Send to Bulletins@cohenlaw.com
Subject: Commercial & Complex Litigation
(continued from previous page)
COMMERCIAL & COMPLEX
LITIGATION PRACTICE
MEMBERS
Morgan Hanson, Chair
Marshall Bender
Ingrid Bohme
Anthony Cillo
Richard Ejzak
Larry Elliott
Kelsey Gdovin
Meaghan Grant
Joshua Hajek
Kevin Harkins
Cezanne Harrer
Lucy Hill
Katie Jacobs
Jason Korn
Alex Lacey
Cliff Levine
Robert Linn
Rachael Loukonen
Brian Maloney
Mark May
Christina McKinley
Alice Mitinger
Richard Nelson
Eric Newman
Eric Olson
Jennifer Park
Julie Patter
Kelley Price
Andrew Roman
David Russey
Barbara Scheib
Robyn Shelton
Fred Shrayber
Andrew Solis
Julie Vanneman
Jeffrey Ward
4. One business-critical issue
can have a dramatic effect.
Cohen & Grigsby’s Commercial & Complex Litigation attorneys
provide clients with experienced business-critical advice,
advocacy, and dispute resolution. We focus on solution-oriented
and cost-appropriate approaches, and high-quality trial services.
Consult directly with senior partners. Profit from efficient representation.
Experience a culture of performance.
412.297.4900 • www.cohenlaw.com