- Drivers’ Liability: The Unavoidable Accident Defense
- Fraudulent Concealment: When does the statute of limitations begin to run for a breach of contract claim, if fraudulent concealment is asserted?
- Application of the Discovery Rule to Breach of Contract Claims
- Proper Procedure to Obtain Entry on Real Property of a Nonparty for Purposes of Inspection and Photographing
- Designating Unknown Responsible Third Parties: How to Properly Designate an Unknown Driver
- Premises Liability: Do Open and Obvious Naturally Occurring Conditions Pose an Unreasonable Risk of Harm?
- The Borrowed Servant Doctrine – At What Point Will the General Employer’s Liability Be Severed?
- Texas Tort Claims Act: Are Physicians Independent Contractors or Employees?
- Diamond Offshore Services Ltd. v. Williams—Courts Must View Video Evidence Before Ruling on Issues of Admissibility
- Reservation of Rights Letter and the Insured
Showing 2 posts from November 2017.
In a previous blog, we discussed “What is Cyber Subrogation?” This week's blog will focus on potential barriers and limitations to successful cyber subrogation. While this list is non-exhaustive, it gives an overview to the various barriers and limitations to successful cyber subrogation. These barriers include (1) contractual waivers and limitations; (2) a lack of clear applicable standards; and (3) the first individuals to investigate the breach or attack are likely the later target defendants, i.e., the fox guarding the henhouse analogy. Read More ›
Cyberattacks have become increasingly frequent and costly. In 2015 alone, an estimated 300 million records were leaked and over $1 billion stolen. By 2017, this number has only risen, with global companies becoming frequent targets. This year, a specific malware cyber-attack orchestrated and launched on Tuesday, June 27, 2017 used a “NotPetya” attack. The malware is called NotPetya because it masquerades as the Petya ransomware. “This [malware] is definitely not designed to make money. This is designed to spread fast and cause damage, with a plausibly deniable cover of ransomware”. Read More ›