EU Court of Justice Declares the US Safe Harbor for the Transfer of Data to Be Invalid
Written by: Richard Sheinis, Esq. In a ruling that can have great ramifications for technology companies, and almost any U.S. company that does business in the EU, the EU Court of Justice has ruled that the Safe Harbor provisions, which for yea
Horseplay or Not Horseplay: That is the Question
Written by: James G. Smith, Esq. Recently, I came across an interesting hypothetical scenario in which “horseplay” could have been asserted as a defense. The hypothetical is as follows: An employee arrives at work in the morning and parks h
The Neverending (Catastrophic) Story: Catastrophic Claimants and the O.C.G.A. §34-9-104 Statute of Limitation
The Georgia Court of Appeals recently issued an opinion that could significantly impact indemnity exposure where a claim is (or has been) accepted as catastrophic. In Barnes v. Roseburg Forest Products Co., Case Number A15A0405 decided July 16,
Obama and Chinese President Reach Agreement to Stop State Sponsored Hacking. Really?
Written by: Richard Sheinis, Esq. On Friday of last week, President Obama announced that he and Chinese President Xi Jinping reached a “common understanding” not to conduct or support state sponsored hacking. “We have agreed that neither
Hackers Use Syrian Refugee Crisis to Scam You
In a classic case of “social engineering” hackers are using the Syrian refugee crisis to scam people out of money and information. Whenever a humanitarian crises hits, hackers will set up fake websites, send phishing e-mails, and use social
Beth Boone Presenting at the Annual American Correctional Health Services Association South East Conference
Beth Boone, Partner at HBS will be presenting Recent Trends in Correctional Health Care Litigation at the annual American Correctional Health Services Association 2015 South East Region Fall Conference At the Savannah Marriot on Saturday, Se
E-Mail Scam Tricking Businesses Into Wiring Funds to Hackers Grows 270%
This week the FBI said an e-mail scam that tricks businesses into wiring funds to hackers has increased 270% since the beginning of 2015. The FBI has named the scam “Business E-Mail Compromise” or “BEC”. The scam occurs when a hacker inf
The Tooth, the Whole Tooth, and Nothing but the Tooth
Here is a smattering of a some of the more interesting articles from the past few weeks related to dental news and commentary from varying perspectives: Patients, Insurance, and Costs There have been several articles recently commenting on the i
Navigational Tips for the Legislative Changes and “240 Process”
A misunderstood area of workers’ compensation defense exists in the notorious “240 process.” As we often see, an employee’s Facebook pictures, or perhaps his comments to a physical therapist, may be inconsistent with his complaints to th
Third Circuit Rules in Favor of FTC Having Authority to Regulate Data Security
On August 24, in FTC v. Wyndham Worldwide Corp., the Third Circuit Court of Appeals found that the FTC had authority to regulate cyber security under the “unfairness” prong of Section 5 of the Federal Trade Practices Act. The background of