PFAS Consumer Fraud Litigation

January 4th, 2023|Categories: Emerging Issues Webinars, Emerging Litigation & Risk, Featured On-Demand, Tort Webinars, Torts-On-Demand-CLE|Tags: , , , , , , , , , , |

HB Litigation Conferences presents a CLE-eligible webinar PFAS Consumer Fraud Litigation and Regulation On August 26, 2022, yet another PFAS consumer fraud lawsuit was filed against a product manufacturer in which it is alleged that since the products contained PFAS and the company marketed the products as environmentally friendly and safe for use by consumers, a proposed class of consumers was deceived into buying the allegedly unsafe products. The lawsuit is not an isolated incident, as there have been over 20 such lawsuits, almost all of them filed in 2022. With the ever-increasing media, political and scientific attention being given to PFAS, the panelists predict that these lawsuits will continue to increase at an exponentially increasing rate moving forward against companies of all sizes that manufacture and supply products. Bringing together almost 20 years of product litigation experience and decades of scientific expertise in the field of chemicals such as PFAS, the panelists will discuss the legal issues that companies are facing from current or legacy uses of PFAS (whether intentional or not) and practical solutions that can be taken pre-lawsuit to understand and minimize risk.  Questions answered: What do state and federal regulations say about PFAS in drinking water? If your company doesn’t use the two original types of PFAS, are you at less risk of [...]

Anderson Kill’s 5th Annual Cyber Insurance Recovery Conference

May 6th, 2019|Categories: HB Risk Notes|Tags: , , , , , , , , , , , , , |

Recent news of "Collection 1", a cache of sensitive data now appearing for sale on the dark web and comprised of an astonishing 773 million records, is a grim reminder of the scope of cyber perils for most.  Last year's staggering tally of serious data breaches and theft coupled with a spate of new legislation for companies gathering, hosting and selling consumer data means policyholders must rise to the challenge.  New state legislation compounds an already daunting federal and international regulatory landscape, and regulatory compliance will be a must to deal with the attendant fines, penalties and consumer claims that non-compliance can trigger.  New technology also continues to drive the evolving conversation about the legal relationships between parties transacting business electronically.  Risks range from anonymity that raises jurisdictional and collection issues to “immutable” record keeping that creates a permanent, public record of transactions. --Anderson Kill   Find out more about this complimentary seminar from Anderson Kill here!

Financial Institutions Struggle to Keep Up with ‘Changing Business Needs’ Such as Social Mobile Apps, and Getting Risk Data Quickly, Deloitte Report Suggests

January 27th, 2019|Categories: HB Risk Notes|Tags: , , , , , , , , |

Deloitte's report is based on a survey of 94 financial institutions around the world that operate in a range of financial sectors and with aggregate assets of $29.1 trillion. Deloitte's Edward Hida  -- financial risk community of practice global leader and a partner in Deloitte Risk and Financial Advisory -- posted his executive summary the latest Global Risk Management Survey which is the organization's eleventh. The report is a detailed one and Deloitte draws quite a few conclusions around the continued focus on cyber security, engagement of boards of directors, increase attention to non-financial risks, the potential of digital risk management, enterprise risk management, the proliferation of Chief Risk Officers, an increased reliance on stress testing and more. A couple figures jumped out at me which show at least two challenges to financial institutions. Hear this Deloitte professional at ICRMC in Toronto April 15-16! Respondents are finding "extremely challenging" the need to keep up with changing business operational needs, such as deployment of social mobile applications, data analytics and cloud-based risks. Also in the "extremely challenging" category, not surprisingly, are threats from "sophisticated actors," like foreign governments and crackerjack hacktivists. Other issues categorized as "extremely high priority "revolve around getting quality risk data quickly. Given the average length of time other studies show that a hacker can poke around in your network before you [...]

Go to Top