- Proper Procedure to Obtain Entry on Real Property of a Nonparty for Purposes of Inspection and Photographing
- Designating Unknown Responsible Third Parties: How to Properly Designate an Unknown Driver
- Premises Liability: Do Open and Obvious Naturally Occurring Conditions Pose an Unreasonable Risk of Harm?
- The Borrowed Servant Doctrine – At What Point Will the General Employer’s Liability Be Severed?
- Texas Tort Claims Act: Are Physicians Independent Contractors or Employees?
- Diamond Offshore Services Ltd. v. Williams—Courts Must View Video Evidence Before Ruling on Issues of Admissibility
- Reservation of Rights Letter and the Insured
- Permissive Interlocutory Appeals
- Graves Amendment
- United Scaffolding, Inc. v. Levine: Expanding Control for the Purpose of Premises Liability Claims
Showing 2 posts from November 2017.
In a previous blog, we discussed “What is Cyber Subrogation?” This week's blog will focus on potential barriers and limitations to successful cyber subrogation. While this list is non-exhaustive, it gives an overview to the various barriers and limitations to successful cyber subrogation. These barriers include (1) contractual waivers and limitations; (2) a lack of clear applicable standards; and (3) the first individuals to investigate the breach or attack are likely the later target defendants, i.e., the fox guarding the henhouse analogy. Read More ›
Cyberattacks have become increasingly frequent and costly. In 2015 alone, an estimated 300 million records were leaked and over $1 billion stolen. By 2017, this number has only risen, with global companies becoming frequent targets. This year, a specific malware cyber-attack orchestrated and launched on Tuesday, June 27, 2017 used a “NotPetya” attack. The malware is called NotPetya because it masquerades as the Petya ransomware. “This [malware] is definitely not designed to make money. This is designed to spread fast and cause damage, with a plausibly deniable cover of ransomware”. Read More ›