Two vials of Botox went missing at a medical spa, and the employer had a hunch that a new employee had stolen them. After the police got involved, the employee was arrested and indicted for felony theft by a grand jury, but...more
On 01 November 2023, K2 Integrity and the National Retail Federation hosted a webinar on the impact of organized retail crime (ORC). Jeanne Meserve moderated the discussion with panelists Mark Skertic, Managing Director at K2...more
Property rights and the protection of personal belongings are essential aspects of any society governed by the rule of law. In the UAE, specific laws and regulations are in place to safeguard property....more
Following the easing of Covid pandemic restrictions, we are now facing a fresh “cost of living crisis” created by rising inflation and soaring energy bills. The Guardian newspaper reported that forecourts at petrol...more
On May 13, 2020, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a joint Public Service Announcement (PSA) about a threat to...more
The SEC has issued new guidance it believes will assist public companies both in assessing materiality and in drafting disclosure related to risks to technology and intellectual property that may result from conducting...more
When Chipotle Mexican Grill Inc. fired store manager Jeanette Ortiz, accusing her of stealing $626 in cash from the safe, it could never have expected its minimal theft loss to balloon into a nearly $8 million jury verdict...more
Section 496 of the California Penal Code makes it a crime to receive stolen property. Any person who has been injured by a violation of the statute may bring an action for three times the amount of actual damages, if any,...more
The U.S. Court of Appeals for the Third Circuit has found that plaintiffs must show a causal connection between the theft of their personal information and the purported harm that they have suffered in order to survive a...more
The Holding - In Preciado v.Young American Insurnace Company, 2017 WL 2805631 ( Ariz.App . June 29, 2017) (unpublished), the Arizona Court of Appeals held the trial court erroneously failed to grant an Insurer’s motion for...more
Best Best & Krieger LLP attorneys Christopher Pisano and Dana Vessey prevailed on a motion for summary judgment on behalf of the City of Colton and one of its police officers in a case that stemmed from a complicated story...more
Have you ever been concerned about the security of your iPad/tablet when you leave your hotel room and head down to the beach or pool? Or when it is left in your car in the mall parking lot while you shop for hours? Or when...more
Among the many challenges that litigants over Nazi-looted art face in the United States is a lack of uniformity. Statutes of limitations vary from jurisdiction to jurisdiction, and interpretations of jurisdictional laws like...more
With stories of cyberattacks and data breaches on a seemingly endless loop, businesses and governments have been doubling down on their efforts to protect digital information and assets. But, in some industries, the greatest...more
In February, we reported on an Alabama federal court decision that barred an insured from recovering for employee theft where the only evidence of shortage was a comparison between computer records and a physical inventory...more
As businesses move away from paper documents, courts are poised to broaden ‘conversion’ definition. The fundamental shift for businesses in the past 15 years from paper documents to computer data has forced the courts...more
In 2010, the New Jersey Supreme Court created a qualified privilege for an employee taking documents to support an employment discrimination suit. However, this past December, in State of New Jersey v. Ivonne Saavedra, the...more
Recently, the Appellate Division of the New Jersey Superior Court upheld a criminal indictment against a former employee of the North Bergen Board of Education (the Board), which stemmed from the alleged theft of public...more
It is a fact of life that large amounts of sensitive data are transported and stored electronically on flash drives, CDs and other devices. With mobility comes increased risk of lost or stolen information, along with the...more