Jury Selection Strategy in Product Liability Litigation – IMS Insights Podcast Episode 64
Insurance for the Cannabis Industry: Risks & Challenges
Safety-ism & Jury Trials – IMS Insights Podcast Episode 61
Bar Exam Toolbox Podcast Episode 131: Listen and Learn -- Strict Products Liability
Losing a finger on the job is more than a painful injury—it’s a life-altering event that can disrupt your livelihood, limit your independence, and leave you facing a long and uncertain recovery. Whether caused by faulty...more
In Johnson v. Amazon.com, Inc., No. 4:22-CV-04086, 2024 U.S. Dist. LEXIS 59196, the United States District Court for the Southern District of Texas held that Amazon.com, Inc. (Amazon) can be liable for negligent undertaking...more
The District of New Jersey has held that Amazon may be sued under New Jersey law for defective products sold by third-party sellers through its online marketplace. The dispute in New Jersey Manufacturers Insurance Group...more
On June 29, 2022, in N.J. Mfrs. Ins. Grp. a/s/o Angela Sigismondi v. Amazon.com, Inc., 2022 U.S. Dist. LEXIS 115826 (Sigismondi), the United States District Court for the District of New Jersey held that Amazon.com, Inc....more
Whether Amazon can be held strictly liable for products sold by third parties through its website is a question courts often face. In Loomis v. Amazon.com, LLC, No. 297995, 2021 Cal. App. LEXIS 347 (Apr. 26, 2021), the Court...more
Consumers are doing more and more shopping online. But when a consumer buys a product that is defective or counterfeit, are online marketplaces liable for misconduct by third-party sellers? E-commerce platforms have...more
In early July, an appeals court ruled that Amazon should be considered a “seller” of goods under Pennsylvania products liability law and subject to strict liability for consumer injuries caused by the defective goods sold on...more
The recent Parity wallet “freeze” provides yet another example of a coding vulnerability in a smart contract (rather than a flaw in the underlying blockchain or cryptography) resulting in an exploit that compromises...more