Bar Exam Toolbox Podcast Episode 319: Spotlight on Torts (Part 3 – Strict and Vicarious Liability)
Compliance Tip of the Day: Avoiding CCO Liability
Podcast - Ohio State Senator Has a Bone to Pick with Court Ruling on Boneless Wings
The Chartwell Chronicles: Tort Reform
2022 FCA Year in Review and Emerging Trends for 2023
Blogging made him both the Pope and the Tom Hanks of D&O insurance - Legally Contented Podcast
Corporate Criminal Liability in South America
Hinshaw Insurance Law TV – Cybersecurity Third and Final Part: Ransomware
Law Brief®: David Pfeffer and Richard Schoenstein Discuss the Legal Implications of Infrastructure Collapses
Texas House Passes Pandemic Liability Protection Act
Roadmap to Joint Venture Agreements: Legal and Accounting Considerations
The Risk of Personal Injury Claims from COVID-19 and What to Do About It
On-Demand Webinar | Eminent Domain in 2020: A Year in Review
What No Statutory COVID Immunity Means for Businesses
New Developments in the World of Section 230
False Claims Act Implications for PPP and Disaster Relief Loans: What Small Businesses Should Be Ready For
JONES DAY TALKS®: Riding the Green Bond Wave: Focus is on Standards as Volumes Surge
Blakes Continuity Podcast: Life Sciences: Liability and Immunity During COVID-19
A Discussion on the Kollaritsch v. Michigan State University Board of Trustees Decision
[WEBINAR] Automated Vehicle Pilot Project Risks and Smart Infrastructure
Truck crash scenes reveal only part of the full story through their debris. Hidden deep within the cab of that 18-wheeler may be a crucial piece of evidence: The electronic control module (ECM), which serves as the truck’s...more
In one of the most closely watched issues before the Georgia Legislature this year, Georgia law has been amended through two tort reform bills, Senate Bills 68 and 69. These bills will impact various aspects of Georgia’s...more
In today’s digital age, text messages play a significant role in communication. Whether through SMS, WhatsApp, or other messaging platforms, people send millions of messages daily, often discussing everything from social...more
Liability insurers often receive policy limit demands from third-party claimants that allege serious injuries without corroborating medical records or bills. Since the enactment of California Civil Procedure Code section 999...more
Recent case law confirms that trade secret owners should proactively investigate any suspicions of theft, and if they do not, they may be at greater risk of being barred under the statute of limitations than they may expect....more
Filing a personal injury claim can be challenging, especially in a state full of unusual laws like California. Each year thousands of Californians seek compensation for injuries and accidents. California has specific laws,...more
Section 130 of the Building Safety Act 2022 (BSA) allows the High Court to make building liability orders (BLO) if it considers it just and equitable to do so. Section 132 allows the court to make an information order to...more
Brown v. Brooks, 2024 WL 5008506, No. 23-2966 (E.D. Pa. Dec. 6, 2024) - This matter involved a motor vehicle accident between the plaintiff and a laundry truck driver, and it illustrates the danger of errors during discovery....more
1) Preservation Demand. Send an evidence preservation notice to anyone you think may be liable or contributed to the fire (so the entity is on notice not to destroy, delete, or alter relevant evidence)....more
Here is a case from the opposite coast of the United States. This case may be looked at as persuasive authority in cases filed in the 9th circuit...more
Wise or not, parties have a right to waive discovery from the other party and settle their matter. Sometimes, both parties have access to and/or knowledge of all of the finances. Sometimes, the rely on the parties sworn Case...more
The concept of corporate legal separateness has long been a fortress protecting affiliated business entities such as parents, subsidiaries, and sister companies from various kinds of liability and litigation. However, how...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more