How is the Carnival Cruise Ship Disaster Like Some Construction Projects?

cruise shipNow that I have your attention:  Have you followed the “cruise from hell” story, in which Carnival Cruise passengers were forced to make do on a ship with no working power or lavatory facilities for the better part of a week?

Think this has nothing to do with construction projects?

On the contrary, this story serves as a reminder that if something can go wrong, eventually, it WILL go wrong.

No where is this more true than on a construction project.

Read my guest post on today’s Construction Law Musings to find out how you can prepare for the unexpected on your construction projects.  While you are there, browse around and check out the wealth of information on Chris Hill’s Virginia-based construction law blog.

~ Melissa

PS:  New to this blog?  Please sign up for email delivery and your free white paper on 7 Critical Mistakes made by architects & engineers.

Photo:  (c) Roger Wollstadt

Gone Fishin’ (& Easy Email Tip to Prevent Lawsuits!) (Tue Tip)

fishing poleI’m writing this post in advance of its publication, as I plan to be out of town when this post goes live.  So today’s Tip will be short and sweet– but nevertheless extremely important.  It comes to us from Audrey Thomas of Organized Audrey.

Here’s Audrey’s “Etiquette Nugget:  Listen to Your Gut”:

If you’ve ever found yourself about to press send, but you get a feeling in your gut that is telling you not to, listen to your gut. There’s a reason why it’s speaking to you.

Perhaps you find yourself thinking these thoughts:

“This is probably going to tick him off.”

“This will put her over the edge.”

“I hope my client doesn’t misinterpret the pricing I’ve laid out for them.”

“I hope they read through this twice before responding back to me.”

If you’ve ever had these or similar thoughts, don’t press send. Instead, have a voice-to-voice conversation regarding the matter by picking up the phone or visiting the person face-to-face.

Another option for those emails that might be a bit “edgy,” is to put them in your drafts folder overnight. It’s amazing what rest can do for your mind and your gut.

I whole-heartedly agree.  I will add:  never put anything in writing (including email) that you wouldn’t want your Grannie to read.  Stay safe out there!

Photo (c) Greenbay.

 

Engineers: Here’s how to Securing your Mobile Device from Cyber-Attacks (guest post)

smartphone iconToday, a very important post from guest blogger Silvia Brook.  Silvias writes about home and cyber security for homesecurity.org. When she’s not writing, Silvia enjoys biking with her friends or cooking a new recipe from her compendium of cookbooks.

————————-

Believe it or not, cyber security is still a big issue in the tech industry. It seems as though every year a new electronic device is released by one of the major hardware developers, and yet every year consumers who buy those same devices fall prey to a host of viruses, glitches, and malware. A tablet released this year may get hit with just as many (if not more) viruses as they model that preceded it the year before.

Part of why that’s the case is because malicious applications are changing and evolving at the same rate as the new devices that they target. Developers on both sides of the equation are fighting to make the better application—those who design security apps and protection software will try to keep your information, while hackers will try just as hard to take it away.

A recent assessment of the Android OS’s newest virus protection software might explain this problem. The new smartphone OS—Android 4.2—has a built-in malware scanner for apps. A computer scientist at North Carolina State University decided to see how this new scanning software stacked up third-party virus protection apps in a test that pits them all against the latest malware targeting smartphones. The study found that the Android OS app scanner caught malware content only about 20% of the time. The third-party security apps fared much better, some of which caught malware nearly every time.

What are we supposed to do with this information? Google seems to have trouble designing a competent virus scanning application for its own line of smartphones, all of which seem at least vulnerable to potential viruses according to the above report. If that’s the case, then how can people expect to put sensitive information (emails, finances, photos, etc.) on their smartphones?

I think the most important takeaway is that cyber security should be taken seriously by people who use mobile devices on a regular basis. There really are malicious apps out there that could do some serious damage to smartphones and tablets.  Design professionals such as engineers and architects who rely on their electronics for mobile work  are best off defending themselves from such annoyances with third-party apps designed by professionals with a proven track record.

Below are two apps by such developers which have received nothing but glowing reviews from critics.

Avast!

Avast! is a comprehensive software that addresses many key cyber security concerns. For one thing, the software will help users track their smartphones or tablets should they ever get lost or stolen. Avast! will let users locate their misplaces phones via GPS and send SMS messages to it should they want to address whoever has it. Of course the software also protects mobile devices from malware apps and websites that could be packing a nasty virus by scanning every app before it’s loaded. Avast! also allows users to build a firewall for their mobile devices should they suspect that hackers want to tamper with their data. In other words, Avast! is the whole security package for the Android, and it’s free!

F-Secure Mobile Security

F-Secure is an acclaimed security software company, protecting both home computers and mobile devices all sorts of cyber security threats. F-Secure will ensure that mobile users can browse the web safely without fear of encountering malware; the service will also scan incoming apps and data for any potential viruses that could compromise the safety of the device. Like Avast!, F-Secure also has a feature that will help users track down their mobile device should it be misplaced or stolen (and users can erase their data remotely it they suspect that someone has access to their information). F-Secure has a subscription fee, and it’s only available for Android users.

Melissa here again.  What about you?  Do you have a favorite cyber security app?  Depending on how much you work in the Cloud, you should!  

Share your recommendations in the comment section, below.  Just remember, I’m a luddite, so talk in plain and simple terms!

Photo (c) Lora Williams

 

Paperwork, and more paperwork–Discovery in the construction lawsuit (Law & Order: Hard Hat files Part 4)

lots of paperworkAs I mentioned at the start of this series, one of the reasons that I like watching Law & Order is that things happen fast, and there is always a smoking gun paper  to be found by the lawyers over a night of eating cold Chinese food.  Yes, well- about that.  In the construction world -not so much.

Depending on the size of the project, there may be massive amounts of paperwork involved.  Think about every email, of every employee who touched the project, from initial proposal through final punch list.  Add in the change order logs, pay applications (with backup), submittals, shop drawings, project correspondence, drawings, specifications, diaries, meeting minutes, daily reports, site inspections, etc—and you can begin to visualize the problems that the magnitude of documentation creates.  Naturally, in the age of electronic data, digital cameras, and cloud computers, the issue of quantity is even more magnified.

Now, let’s discuss the discovery process in a construction lawsuit—that is, what the other side can ask for, what you must give, and how the process works.  Then I’ll detail a few recommended practices to put your firm in the best position possible if and when it has to deal with the information overload of a construction lawsuit.

What is “discovery” in the legal world?

Discovery is the all-encompassing term for means and methods to get information necessary to prosecute or defend a lawsuit.  The main written discovery consists of interrogatories and requests for production of documents.  Interrogatories are written questions that you (with the help of your lawyer) must answer about the project.  Requests for production, on the other hand, are requests made for documents that may, or may not, be relevant or admissible.  Inevitably, in one form or another, your entire project files need will likely need to be produced to the other side.

Be aware: things that you may not consider part of your firm’s project files may still be demanded. 

  • Does anyone at your company keep an old-fashioned pocket calendar, filled with a mixture of both business items and personal information?  It can be demanded in the discovery process.
  • Does your company conduct internal post-mortem meetings to discuss ways to improve on future problems and what went wrong on this one?  Discoverable.
  • Does one of your employees have a personal relationship with an employee of the general contractor, such that they send good-natured barbs and sarcastic comments about the project or project personnel to one another?  Yep- you guessed it—discoverable.

Each and every document, paper, back of envelope note, or personal diary entry can be demanded.  Scary prospect, right?

What can you do to limit the embarrassment and lessen the pain?

To lessen the pain, be sure to adopt some best management project and personnel practices, including:

  • Consistent intake methods.  Every employee who brings in work should know to find, modify, and use the Firm’s contract and/or form proposals.  Educate both your employees and your clients on the importance of having good, written contracts and proposals, and procure them in a uniform and systematic way.  There should also be a follow up procedure in place, in case a signed contract or proposal is not obtained.  One suggestion I have made previously:  do not open a new client or matter number to bill against until the contract is in place.

 

  • Management of rogue employees.  Ideally, don’t let any employees only use their hard drive.  If you can’t achieve that level of cooperation, at least insist that documents be copied over to the Firm’s computer system on a regular basis, and at least weekly.

 

  • Decide on Firm-wide file management.  Everyone on your staff should be filing everything the same way, whether in paper records or in email folders.   As noted in my post on how to smartly handle project documents, all communications should be in one place, preferably in a chronological order.  Failing that, a master chronological file could be kept for future reference.  You also must decide whether and which emails need to be printed and/or saved, and institute a standard policy Firm-wide for those as well.

 

  • Create a Problem file(s).  If problems in certain areas arise, maintain a separate file and/or e-folder for all documents relating to that area.  Who knows, one of those may end up being the smoking gun that makes your case.

 

  • Use a separate Legal file, if necessary.  Related to the problem file, if you get any legal help or help from your insurance company, create a new “Legal” file for legal issues, communications, and the like.  Do NOT keep this file with the other project files.  Ideally, all legal files should be kept in a different location/drawer/desk/office to prevent inadvertent disclosure in a lawsuit.

 

And, the #1 Rule relating to document best practices?

 

  • Follow the Grandma/Newspaper rule.  That is, instruct your employees to be careful in what they say in any forum– website, newsgroup, email, etc.  Before sending off any questionable communications, each employee should ask himself:

How would my grandma feel if she read my message in the newspaper? 

If he feels comfortable that the message wouldn’t make Grandma hold her head in shame, then and only then should he press “send”.

 

While you don’t need to know all the details of how to answer discovery unless and until you’ve been sued, if you follow these document best practices, you will be far ahead of the curve should you have to defend yourself in court.

Questions, comments, observations?  Share in the comments below or shoot me an email. 

Next in our series:   Being deposed—not just for dictators! Depositions in the construction lawsuit

 Photo (c) Veronica Robbins via CC.

You Don’t Need to be Goliath to Get Sued for Professional Malpractice (infographic)

Think most business lawsuits effect the “big guys”?  Not according to the folks at Bolt Insuarnce.  According to them,  57% of lawsuits effect companies making less than $1 million in revenue. Did you know that 1 in 3 small business owners are sued or threatened with a law suit?

SOME CURRENT SCARY FACTS:
  • $100 billion: How much small businesses spend on legal action in the U.S. annually
  • 25%: Number of harassment claims has risen since 2006
  • $404 Million: Price to settle discrimination related law suits each year
  • 104 Billion: Annual cost to settle tort liability

Check out the neat infographic below to learn Five Ways to Protect Your Firm. 

 

Is Your Small Business Courting Disaster?
Via: BOLT Insurance

————————–

What about you, blog readers? Have YOU had the occasion to be threatened with a lawsuit?  Learn any good lessons to share?  If so, drop a note below.

Infograph: BOLT Insurance