The Neverending (Catastrophic) Story: Catastrophic Claimants and the O.C.G.A. §34-9-104 Statute of Limitation
The Georgia Court of Appeals recently issued an opinion that could significantly impact indemnity exposure where a claim is (or has been) accepted as catastrophic. In Barnes v. Roseburg Forest Products Co., Case Number A15A0405 decided July 16,
Obama and Chinese President Reach Agreement to Stop State Sponsored Hacking. Really?
Written by: Richard Sheinis, Esq. On Friday of last week, President Obama announced that he and Chinese President Xi Jinping reached a “common understanding” not to conduct or support state sponsored hacking. “We have agreed that neither
Hackers Use Syrian Refugee Crisis to Scam You
In a classic case of “social engineering” hackers are using the Syrian refugee crisis to scam people out of money and information. Whenever a humanitarian crises hits, hackers will set up fake websites, send phishing e-mails, and use social
Beth Boone Presenting at the Annual American Correctional Health Services Association South East Conference
Beth Boone, Partner at HBS will be presenting Recent Trends in Correctional Health Care Litigation at the annual American Correctional Health Services Association 2015 South East Region Fall Conference At the Savannah Marriot on Saturday, Se
E-Mail Scam Tricking Businesses Into Wiring Funds to Hackers Grows 270%
This week the FBI said an e-mail scam that tricks businesses into wiring funds to hackers has increased 270% since the beginning of 2015. The FBI has named the scam “Business E-Mail Compromise” or “BEC”. The scam occurs when a hacker inf
The Tooth, the Whole Tooth, and Nothing but the Tooth
Here is a smattering of a some of the more interesting articles from the past few weeks related to dental news and commentary from varying perspectives: Patients, Insurance, and Costs There have been several articles recently commenting on the i
Navigational Tips for the Legislative Changes and “240 Process”
A misunderstood area of workers’ compensation defense exists in the notorious “240 process.” As we often see, an employee’s Facebook pictures, or perhaps his comments to a physical therapist, may be inconsistent with his complaints to th
Third Circuit Rules in Favor of FTC Having Authority to Regulate Data Security
On August 24, in FTC v. Wyndham Worldwide Corp., the Third Circuit Court of Appeals found that the FTC had authority to regulate cyber security under the “unfairness” prong of Section 5 of the Federal Trade Practices Act. The background of
Cyber Scam Gets Executive to Wire Funds to the Hackers
Ubiquiti Networks, Inc. was recently the victim of a cyber scam in which the thieves sent spoof communications to executives to trick them into wiring funds to the fraudsters to the tune of $46.7 million. Go to Krebs on Security, http://krebson
FDA Urges Hospitals to Discontinue Use of Hospira Infusion System Due to Cybersecurity Vulnerabilities
In a warning that is the first of its kind, on July 31, 2015, the FDA encouraged healthcare facilities to stop using the Hospira Symbiq Infusion System due to cybersecurity vulnerabilities. (http://www.fda.gov/MedicalDevices/Safety/AlertsandNoti