Verified Document

Tort Liability Bug May Have Term Paper

¶ … tort liability BUG may have to the vendor and to the BUG employees that were attacked.

A defendant who engages an independent contractor, such as a head of the shipping dock, is not liable to others for the acts or omissions of the independent contractor. In this case, the person in charge of supervising shipping dock could be argued to be fault for improper security and vigilence. "An independent contractor is a person who performs services for another person under an express or implied agreement and who is not subject to the other's control, or right to control, over the manner and means of performing the services." (Tort Liability Basics: Strict, Vicarious, and Joint Liability," 1999) However, the BUG company owns the dock, and is thus responsible for maintaining the security of the facility, and ensuring the safety of the goods on the premises, and would likely be found liable for the loss of merchandie and injury due to the robbery. Vicarious liability imposes liability on one person for an illegal or tortious act committed by another, such as the negligent conduct of the dockyard worker under BUG's employ. Tort Liability Basics: Strict, Vicarious, and Joint Liability," 1999)

Question B

What defenses may be available to BUG?

BUG could argue that neither the dockyard worker not BUG security measures were not negligent, that security was adequate, and the incident was much like a car accident, making it the fault of the driver or robber, not BUG's inability to protect the employee of the vendor company. However, even if a car accident occurs "while the employee was driving from his office to a client's site," on a professional matter, the employer will likely be liable for the accident, thus BUG's legal fate does not look salutory. (Tort Liability Basics: Strict, Vicarious, and Joint Liability," 1999)

Works Cited

Tort Liability Basics: Strict, Vicarious, and Joint Liability." (Nov 1999) Findlaw. Retrieved 16 Sept 2006 at http://www.inc.com/articles/1999/11/15396.html

Cite this Document:
Copy Bibliography Citation

Related Documents

Business Law - Bug, Inc.
Words: 1972 Length: 5 Document Type: Term Paper

Another option could be fro Bug to use a defense of proximate cause which states that for a negligent act or omission to be a proximate cause of damage, it must be a natural and probable (not just possible) result of a sequence unbroken by any intervening causes. 6. [See situations b. And c. For background information.] The attorneys for BUG have completed their investigation of WIRETAP and its employee,

Sorts of Legal Protections Should Bug Have.
Words: 1755 Length: 4 Document Type: Term Paper

sorts of legal protections should BUG have. Bug automatically has protection of its trade secrets, which involve confidential issues such as product plans and new designs, any sort of business proceedings, and products under development prior to patent application. Bug does not need to file anything to maintain these rights other than take all reasonable precautions to keep them secret, such as informing employees that these are trade secrets, refraining

Product Liability Tort Risk and Responsibility a
Words: 924 Length: 3 Document Type: Essay

Product Liability Tort RISK AND RESPONSIBILITY A tort is a civil wrong, loss or harm inflicted by a person's behavior upon another (LII, 2010). While it is not necessarily an illegal act itself, the law allows the person harmed to recover his loss or receive compensation for the harm. It differs from a crime wherein the person's harmful act affects society in general. A claim of tort may be filed in a

Non Linear Pro-Is a Company That Sells
Words: 1201 Length: 3 Document Type: Essay

Non Linear Pro-is a company that sells editing equipment. Recently, the company was involved in a transaction that involved the lease of equipment to Quick Text Video on a trial basis. Before the purchase, the sales representative for NonLinear Pro and the company manger for Quick Text Video discussed the pros and cons of the product. The salesman indicated that the system would be up and running within a day

Hacker/Hacker Techniques the Hackers in
Words: 3074 Length: 8 Document Type: Term Paper

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now