CLIENT MEMORANDUM IN THE WAKE OF STORM SANDY, INSURANCE COMPANIES SHOULD ENSURE THAT THEIR BUSINESS CONTINUITY AND DISASTER RECOVERY PLANS COMPLY WITH LEGAL REQUIREMENTS AND BEST PRACTICES How do insurance companies prepare for the risks presented to their own business operations by natural disasters such as Storm Sandy? In the immediate aftermath of Storm Sandy, insurers’ disaster response to policyholders and regulators is an immediate priority. Also important to insurers, however, is an assessment of the risks presented to their own business operations by such natural disasters. This client memorandum focuses on the following key aspect of insurers’ disaster risk assessment and recovery efforts: the protection of data, information technology, business records and private medical and financial information. More specifically, set forth herein is: (1) a summary of significant statutory and regulatory frameworks that relate directly or indirectly to insurance company disaster recovery planning; and (2) a practical assessment of data protection and recovery best practices that insurance companies should consider implementing to minimize risk and maximize compliance. I. Key Federal and State Legal Requirements and Guidance A. Insurance Company Disaster Planning – Disaster Preparedness and Response New York-licensed insurers are expected to prepare for, and respond to, disasters as set forth in various circular letters issued by the New York Department of Financial Services (the “NYDFS” or the “Department”).1 Such disaster preparedness standards incorporate a Business Continuity Plan Questionnaire (“BCPQ”) to “assure the [NYDFS] that each [insurer] has taken steps to put in place a Business Continuity Plan that would reasonably ensure that the recovery of critical business processes could take place in the event of a disaster.”2 The BCPQ also ensures that the business continuity plan has been tested, is kept in a secure off-site location, and addresses all significant business activities, including financial functions, telecommunications services, data processing, and network services.3 Similarly, the Florida Office of Insurance Regulation (the “FLOIR”) has issued guidance to ensure insurance company preparedness for the hurricane season.4 Such guidance addresses 1 N.Y. Circ. Ltr. 2012-1 (Apr. 9, 2012) (applicable to “authorized property/casualty insurers”); see also N.Y. Circ. Ltr. 2012-2 (Apr. 12, 2012) (applicable to “authorized health insurers”); N.Y. Circ. Ltr. 2012-3 (Apr. 12, 2012) (applicable to “authorized life insurers”). 2 N.Y. Circ. Ltr. 2012-1 (Apr. 9, 2012). 3 See NYDFS Business Continuity Planning Questionnaire, http://www.dfs.ny.gov/insurance/circltr/cl2012_dpr.htm. 4 See, e.g., Fla. Info. Memo. OIR-05-007M (June 8, 2005). NEW YORK WASHINGTON PARIS LONDON MILAN ROME FRANKFURT BRUSSELS in alliance with Dickson Minto W.S., London and Edinburgh disaster recovery plans “to ensure company facilities are operational post-storm,” which include reviewing functions such as backup power, backup telephone systems or call centers, backup staffing, technology issues, system access, and contract resources for services restoration.5 B. Risk & Solvency Assessment Insurers’ business continuity and disaster plans are subject to regulatory examination as part of the risk-focused financial condition examination process. For examinations beginning in 2010, state insurance regulators have applied a revised risk-focused examination approach to better incorporate prospective risk assessment related to insurer solvency and focus on management’s ability to identify, assess and manage the insurer’s business risks. The NAIC Financial Condition Examiners Handbook provides that the person responsible for “maintaining, updating and testing the insurer’s business continuity and disaster recovery plans” should be identified and interviewed, and that the insurer’s Chief Risk Officer “should be interviewed regarding the company’s plan for operating in crisis/disaster—business continuity.” Confirmation that an insurer’s disaster recovery plan has been tested is an additional element of the examiner’s riskfocused examination. It is also noteworthy that the NAIC recently adopted the Risk Management and Own Risk and Solvency Assessment Model Act (“ORSA Model Act”), and has proposed an Own Risk and Solvency Assessment (“ORSA”) Guidance Manual. Although ORSA Model Act and ORSA Guidance Manual are not prescriptive, if adopted by the states, they would require covered insurers to assess, monitor, document and report on business operations risks. C. The Sarbanes-Oxley Act Of 2002: Business Continuity For Publicly Traded Companies The Sarbanes-Oxley Act of 2002 (“SOX”) does not directly address disaster recovery planning; however, it does cover business continuity planning with respect to an organization’s operations in the event of a disaster, including maintaining operations in order to prepare timely accurate financial statements. Compliance with Section 404 of SOX requires organizations to design and establish controls and infrastructure with the aim of protecting and preserving business records from loss, destruction, or unauthorized alteration. This would include: (1) the establishment of a control environment; (2) risk assessment; (3) the implementation of control activities; (4) the creation of effective communications and information flows; and (5) monitoring.6 D. HIPAA: Protected Health Information The Health Insurance Portability and Accountability Act of 1996, as amended by the Health Information Technology for Economic and Clinical Health Act of 2009, and its implementing regulations (collectively, “HIPAA”), impose various obligations regarding disaster recovery 5 See id. 6 See Committee of Sponsoring Organizations of the Treadway Commission, Internal Control—Integrated Framework (Dec. 2011), http://www.coso.org/documents/coso_framework_body_v6.pdf. -2- plans on insurance companies that qualify as “covered entities” or “business associates” within the meaning of the law.7 As an overarching matter, HIPAA-covered insurers must establish (and implement as needed) “policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain [EPHI].” The provisions of HIPAA’s implementing regulations covering business continuity and disaster recovery planning are established as part of the HIPAA Security Rule 8 and are located at 45 C.F.R. § 164.308 (Administrative Safeguards), 45 C.F.R. § 164.310 (Physical Safeguards), and 45 C.F.R. § 164.312 (Technical Safeguards). As identified in the following list, some of the provisions established under HIPAA regulations are “Required” (“R”), whereas others are “Addressable” (“A”).9 These provisions include: (1) a data backup plan (R);10 (2) a disaster recovery plan (R);11 (3) an emergency mode operation plan (R);12 (4) an emergency access procedure (R);13 (5) contingency operations procedures (A);14 7 8 Whether a given insurer’s activities relating to health care or health information will result in regulation under HIPAA can be a complex question for which advice from counsel should be sought. Initially, HIPAA’s requirements only applied to “covered entities” (essentially health plans, health care clearinghouses, and healthcare providers), in connection with their use of electronic protected health information (“EPHI”), which is defined as individually identifiable health information that is either transmitted by electronic media or maintained in electronic media. However, these requirements have recently been expanded to directly cover “business associates” as well, which are organizations that perform, or assist a covered entity in the performance of, a function or activity involving the use or disclosure of EPHI, including claims processing or administration, data analysis, processing or administration, utilization review, quality assurance, billing, benefit management, practice management, and repricing. As the Department of Health and Human Services (“HHS”) is in the process of finalizing further HIPAA rules, it is not currently enforcing these requirements against business associates, but state attorneys general have done so, and HHS will as well when it finalizes its rules. The Security Rule is located at 45 C.F.R Part 160 and Subparts A and C of Part 164. 9 When an implementation specification is required, a HIPAA-covered insurer must comply with the implementation specification as written. By contrast, when an implementation standard is addressable, a HIPAA-covered insurer has somewhat more flexibility. As a threshold matter, an addressable implementation specification must be complied with if it is “reasonable and appropriate” for the insurer to do so. However, if a HIPAA-covered insurer, after a risk assessment and analysis, determines that complying with a particular implementation specification is not reasonable or appropriate, it must consider whether there is a reasonable and appropriate alternative that accomplishes the same purpose. If the HIPAA-covered insurer determines that there is no reasonable or appropriate alternative, it must document why it would not be reasonable and appropriate to implement the implementation specification. Thus, in general, HIPAA compliance requires an additional level of analysis and documentation by covered insurers. 10 45 C.F.R. § 164.308(a)(7)(ii)(A); see also 45 C.F.R. § 164.310(d)(2)(iv) (HIPAA-covered insurers must create a retrievable, exact copy of EPHI, when needed, before movement of equipment). 11 45 C.F.R. § 164.308(a)(7)(ii)(B). 12 45 C.F.R. § 164.308(a)(7)(ii)(C). 13 45 C.F.R. § 164.312(a)(2)(ii). 14 45 C.F.R. § 164.310(a)(2)(i). -3- (6) an applications and data criticality analysis (A);15 and (7) testing and revision procedures (A).16 Specifications 1 and 2 above require a HIPAA-covered insurer to create procedures to back up and be able to restore exact copies of EPHI if lost. Specifications 3-5 cover procedures for the continuation of critical business processes to protect the security of and maintain access to EPHI during an emergency. Specification 6 covers access to the insurer’s facilities in support of the activities covered in the prior specifications, and specification 7 covers the need to ensure that all of the procedures herein are reviewed and revised on a timely basis. It is important that HIPAA-covered insurers understand that the provisions cited above are not waived or suspended in the event of a federally declared emergency or disaster.17 Although the Secretary of the Department of Health & Human Services may suspend certain provisions of the HIPAA Privacy Rule in the event of a federally declared emergency or disaster, 18 the provisions that may be suspended have no bearing on those cited above, which appear in the Security Rule. Although the federal government may exercise discretion when enforcing HIPAA, insurers should not be lulled into a false sense of security; a failure to comply with HIPAA’s emergency and disaster requirements cannot be explained away by the occurrence of an emergency or disaster. E. The Gramm-Leach-Bliley Act: Nonpublic Personal Information Pursuant to Title V of the Gramm-Leach-Bliley Act (the “GLBA”), 15 U.S.C. § 6801, et seq., financial institutions, including insurers, must protect the security and confidentiality of customers’ nonpublic personal information. GLBA requires that each state insurance agency “establish appropriate standards for financial institutions subject to their jurisdiction relating to administrative, technical, and physical safeguards — (1) to insure the security and confidentiality of customer records and information; (2) to protect against any anticipated threats or hazards to the security or integrity of such records; and (3) to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any 15 45 C.F.R. § 164.308(a)(7)(ii)(E). 16 45 C.F.R. § 164.308(a)(7)(ii)(D). 17 Office for Civil Rights, Health Information Privacy – Frequently Asked Questions, http://www.hhs.gov/ocr/privacy/hipaa/faq/securityrule/2005.html. 18 Pursuant to 42 U.S.C. § 1320b-5, the Secretary of HHS may waive certain provisions of the HIPAA Privacy Rule following a presidential declaration of an emergency or a disaster. The Secretary must, in turn, declare a public health emergency as well. Following such a joint declaration, the Secretary may waive the following provisions of the HIPAA Privacy Rule: (1) the requirements to obtain a patient’s agreement to speak with family members or friends involved in the patient’s care (45 C.F.R. § 164.510(b)); (2) the requirement to honor a request to opt out of the facility directory (45 C.F.R. § 164.510(a)); (3) the requirement to distribute a notice of privacy practices (45 C.F.R. § 164.520); (4) the patient’s right to request privacy restrictions (45 C.F.R. § 164.522(a)); and (5) the patient’s right to request confidential communications (45 C.F.R. § 164.522(b)). These waivers exceed those disclosures already permitted by law. See Hurricane Katrina Bulletin: HIPAA Privacy and Disclosures in Emergency Situations, Sept. 2, 2005, http://www.hhs.gov/ocr/privacy/hipaa/understanding/special/emergency/katrinanhipaa.pdf. -4- customer.”19 In New York, for example, Regulation 173 requires that “each licensee shall implement a comprehensive written information security program that includes administrative, technical and physical safeguards for the protection of customer information.”20 Although not explicit, the protections required for such nonpublic personal information would reasonably relate to disaster preparedness and recovery. II. Best Practices The complex priorities of assessing, monitoring, and planning for risks in order to maintain business operations while protecting confidential policyholder information present unique challenges to the insurance industry. Highlights of significant considerations and best practices in this regard are set forth below. We note that a given insurer may be subject to one or more of the laws discussed above, and thus some of the practices below may also be legal requirements; this is particularly true for HIPAA-covered insurers. Please consider discussing your business continuity / disaster recovery plan with counsel to ensure compliance with such requirements. A. Key First Steps The first step any insurer should take in the business continuity planning process is to analyze its vulnerabilities. To do so, an insurer should conduct: (1) a business impact analysis; and (2) a risk analysis. The business impact analysis is the process through which the insurer must determine which systems and data should be viewed as critical and which should be viewed as noncritical. The risk analysis is the process through which the insurer considers the potential circumstances that could constitute a disaster, i.e., a threat to the critical systems and data identified in the business impact analysis. Both steps naturally involve a cost/benefit analysis, but an insurer must take care to go beyond a consideration of operational losses and take into account legal costs for failure to comply with various federal, state, and local laws and regulations that mandate specific procedures and redundancies depending on the regulatory structure covering the insurer. 1. Business Impact Analysis / Data Classification Policy The business impact analysis is the first study an insurer must conduct as part of its business continuity planning. Most insurers are already aware of which systems and data are critical from an operational and a profit-making perspective, but this analysis must take into account any legal requirements to which a given insurer is subject. Certain regulatory structures have explicit requirements that state in detail which systems and data are critical. For example, insurers covered by HIPAA are subject to regulations that classify data (e.g., as EPHI) and mandate specific requirements in the event of an emergency. 21 On the other hand, other laws may not be as explicit. For example, as noted above, while SOX does not have a specific disaster recovery 19 15 U.S.C. § 6801(b). 20 11 N.Y.C.R.R. 421.2; see also N.Y. OGC Opinion No. 2002-46 (Feb. 14, 2002). 21 See 45 C.F.R. § 164.308(a)(7). -5- requirement, the statute does generally speak to business continuity planning with respect to an organization’s operations in the event of a disaster, including maintaining operations in order to continue to prepare timely and accurate financial statements. 2. Risk Analysis / Determine Threats Once insurers, through a business impact analysis, have determined which systems and data are critical, the insurers must next consider which possible threats exist to the security, confidentiality, integrity, and availability of that data, and whether those threats call for specific pre- or post-response actions. Naturally, this analysis will reflect the business judgments of a given insurer, as some threats are more likely than others, but insurers subject to various regulatory structures must take all reasonable threats into account. Any threat that could affect the regulated systems or data is a potential liability for the insurer, and all reasonable threats must therefore be considered and mitigated to the extent possible. In some cases, the regulatory structure will suggest certain risks. For example, HIPAA contains a nonexhaustive list that includes “fire, vandalism, system failure, and natural disaster.”22 Other authorities speak more broadly, such as the guidance put forth by the NYDFS, which requires insurers to plan for and protect against “damages arising from natural and man-made disasters.”23 Companies should consider threats unique to their business model, location(s), and other particular attributes. B. Security Controls (Physical, Electronic/Access Control) Many types of disasters identified through the risk analysis will challenge an insurer’s ability to maintain the security of critical systems and data. However, it would be imprudent to assume that noncompliance with any established sector-specific or other applicable regulatory or similar data and systems integrity obligations would be deemed acceptable simply because a disaster is underway or has occurred. Thus, an insurer must ensure that the appropriate data and systems security protocols are followed leading up to and maintained during a disaster to avoid exposing itself to legal liability. Insurers should evaluate possible mechanisms for ensuring the security of critical systems and data, including both physical and electronic access controls. Depending on the data at risk, this regulatory requirement or best practice relates to both the system(s) and data recovery/restoration process and the emergency access procedure discussed, infra. Further, as the insurer recovers from a disaster, it should, at a minimum, ensure that the confidentiality, integrity, and availability of systems and data are not compromised by a security breach. As part of this pre-disaster planning and risk analysis, insurers should consider whether their established, pre-disaster access controls should, and under what circumstances, be extended to other personnel (internal or external) in response to an emergency.24 22 45 C.F.R. § 164.308(a)(7)(i). 23 See N.Y. Circ. Ltr. 2012-1 (Apr. 9, 2012) (applicable to “all authorized property/casualty insurers,” among other entities); N.Y. Circ. Ltr. 2012-2 (Apr. 12, 2012) (applicable to “authorized health insurers”); N.Y. Circ. Ltr. 2012-3 (Apr. 12, 2012) (applicable to “authorized life insurers”). 24 See Emergency Access Procedure, infra. -6- C. Backup, Emergency Access, and Restoration Mechanisms As part of the business impact and risk analyses, insurers should determine which systems and data are critical, i.e., those that cannot, as a legal or business imperative, be compromised as the result of a disaster. As part of this determination, insurers should employ loss prevention measures to ensure that effective backup and restoration mechanisms are in place to ensure the safety of the systems and data identified as critical from the threats identified as reasonable during the risk analysis phase. 1. Backup Procedures The backup procedures an insurer should implement will vary based on operational needs and any legal requirements to which the entity is subject. The type of data backed up should at least include that which was determined to be critical under the business impact analysis, supra. For example, HIPAA-covered insurers are only explicitly required to “create and maintain retrievable exact copies of [EPHI].”25 However, a HIPAA-covered insurer must take into account the nature of the EPHI it holds, including the frequency with which it changes, to ensure that backups are sufficiently regular so as to avoid running afoul of HIPAA’s data integrity requirements.26 As an example of a more general requirement, as part of an insurer’s business continuity plan, the NYDFS asks insurers to ensure their “[business continuity] plan contain[s] a list of critical computer application programs, operating systems and data files.”27 Other statutes, such as SOX, may have additional backup requirements. 2. Emergency Access Procedures During or in the aftermath of a disaster, but before a full restoration via backup, certain insurers will be required to maintain or immediately resume access to their critical systems and data as identified by the business impact analysis. To the extent required by any regulatory requirements to which the insurer is subject, insurers should ensure that they are able to do so. For example, HIPAA requires “procedures for obtaining necessary [EPHI] during an emergency.”28 This could potentially require the redundancy of critical systems that provide an alternate access path in the event that primary systems become unavailable due to a disaster or other emergency situation. Furthermore, it could require changes to access controls in the event that alternate personnel (e.g., internal IT technicians or other external IT forensics specialists) are needed to retrieve or otherwise ensure access to critical systems or data. Similarly, the NYDFS asks insurers whether, in drafting a business continuity plan, the insurer has “developed adequate 25 45 C.F.R. § 164.308(a)(7)(ii)(A). 26 See, e.g., 45 C.F.R. § 164.312(c). 27 NYDFS Business Continuity Planning Questionnaire, http://www.dfs.ny.gov/insurance/circltr/cl2012_dpr.htm. 28 45 C.F.R. § 164.312(a)(2)(ii). -7- manual processing procedures for use until the electronic data processing function can be restored.”29 Insurers should carefully evaluate any such access changes made in the event of a disaster and implement procedures to ensure the confidentiality and integrity of critical systems and data. Although legal provisions may impose a requirement for ongoing access to the systems and data, any decision to relax documented security controls to facilitate such access should be directed and controlled by senior supervisory personnel. If such deviations from established security controls are deemed necessary to comply with law or business imperatives, supervision and monitoring would likely need to be heightened to maintain the confidentiality and integrity of the affected systems and data, both to ensure that no breaches occur during the disaster and to ensure that once the disaster is resolved, normal security controls are restored. 3. Restoration Procedures Data restoration procedures will similarly vary based on operational needs and any regulatory requirements to which the insurer is subject. Some laws may contain explicit requirements. For example, HIPAA requires “procedures to restore any loss of [EPHI] data.”30 However, the question is broader than the mere restoration of data, as the data must be restored to an available system that is actually accessible. To that end, the insurer’s risk analysis (see supra) should anticipate this need and be guided in this regard. If possible disasters include environmental ones such as storms that could have a severe region-wide impact, the entity should consider a restoration plan that involves more secure, off-site facilities outside a given region. For example, as part of an insurer’s business continuity plan, the NYDFS asks whether an insurer has an agreement in place to use “a specific alternate site and computer hardware to restore data processing operations after a disaster occurs” and whether “the site [has] a backup generator in place in case of local power outages, a fire detection and suppression system and moisture sensors in place under the raised floor.”31 Moreover, the NYDFS asks whether an insurer’s business continuity plan “contains a list of supplies that would be needed in the event of a disaster, together with names and phone numbers of the suppliers.”32 The NYDFS stresses the importance of an insurer “undertak[ing] steps in managing [its] supply chain” as part of its business continuity plan.33 Similarly, the FLOIR suggests that insurers, when considering a disaster recovery plan “to ensure company facilities are operational post-storm,” address physical resources such as “office space, back-up power . . . back-up telephone system . . . technology 29 NYDFS Business Continuity Planning Questionnaire, http://www.dfs.ny.gov/insurance/circltr/cl2012_dpr.htm. 30 45 C.F.R. § 164.308(a)(7)(ii)(B) (emphasis added). 31 NYDFS Business Continuity Planning Questionnaire, http://www.dfs.ny.gov/insurance/circltr/cl2012_dpr.htm. 32 Id. 33 Id. -8- issues, computers / laptops / printers / calculators, system access, server alternatives, [and] contract resources for services restoration[.]”34 D. Policy Distribution Mechanism / Documentation Plan A disaster recovery plan is only effective if an insurer’s employees are trained and aware of it. Moreover, certain laws require covered insurers to ensure that employees have ready access to the plan. For example, HIPAA requires mandated procedures to be in written (or electronic) form, and for that documentation to be available to “those persons responsible for implementing the procedures.”35 When evaluating an insurer’s business continuity plan, the NYDFS asks whether the insurer’s “business continuity plan clearly describe[s] senior management roles and responsibilities associated with the declaration of an emergency and implementation of the business continuity and disaster recovery plans.”36 Moreover, the NYDFS looks to see whether an insurer’s business continuity plan “clearly identif[ies] the general process by which the threat will be assessed and the specific individuals who are authorized to declare an emergency.”37 Therefore, it is important for insurers to carefully consider mechanisms for ensuring that their employees are sufficiently aware of and trained in the company’s emergency procedures, such that they are able to adequately respond in the event of a disaster. Access to emergency plans and policies is also critical. Thus, while an insurer may choose to provide electronic access to copies of (or updates to) its disaster recovery plan documents, the insurer should strongly consider regularly making hard copies of such plans/policies available to key personnel, as a loss of power or a system failure is a common type of disaster that would be identified in the risk analyses of nearly every company. For example, the NYDFS asks insurers whether “copies of the [business continuity] plan [are] kept in relevant off-site locations.”38 E. Test and Review Process Finally, one of the most important best practices to employ is the regular testing, review, and redrafting, where necessary, of the procedures discussed above and the documentation that results. As part of the business continuity planning process, the NYDFS asks insurers whether their business continuity plan is “current, based on a business impact analysis, [has] been tested [and whether that test has occurred in the last year].”39 Moreover, the NYDFS asks insurers to 34 Fla. Info. Memo. OIR-05-007M (June 8, 2005). 35 45 C.F.R. § 164.316(b). 36 NYDFS Business Continuity Planning Questionnaire, http://www.dfs.ny.gov/insurance/circltr/cl2012_dpr.htm. 37 Id. 38 Id. 39 Id. -9- review the plan to ensure that it covers “all significant business activities, including financial functions, telecommunication services, data processing, [and] networking services,” and to ensure that “a restoration priority [has] been assigned to all significant business activities.”40 A regular review of the business impact analysis and risk analysis serves to ensure that all necessary systems and data designated as critical are examined regularly and tested to determine whether then-current procedures are sufficient and will work as planned. Too many companies neglect this important step and, following a disaster, find that their procedures did not function as planned, or worse yet, that backup, emergency access, or restoration of critical systems and data is not achievable. Such a failure can expose insurers to serious liability. Again, insurers should seek advice from counsel during each review stage of their business continuity plans to ensure that they account for the most current federal, state, and local laws, regulations, and guidance, as well as industry best practices. *************** If you have any questions regarding this new proposal, please contact Leah Campbell (212-7288217, [email protected]), Francis M. Buono (202-303-1104, [email protected]), McLean B. Sieverding (202-303-1163, [email protected]), Carissa M. Mann (212-7288186, [email protected]), Benjamin B. Williams (202-303-1146, [email protected]), or the Willkie attorney with whom you regularly work. Willkie Farr & Gallagher LLP is headquartered at 787 Seventh Avenue, New York, NY 100196099. Our telephone number is (212) 728-8000, and our facsimile number is (212) 728-8111. Our website is located at www.willkie.com. December 11, 2012 Copyright © 2012 Willkie Farr & Gallagher LLP. All Rights Reserved. This memorandum may not be reproduced or disseminated in any form without the express permission of Willkie Farr & Gallagher LLP. This memorandum is provided for news and information purposes only and does not constitute legal advice or an invitation to an attorney-client relationship. While every effort has been made to ensure the accuracy of the information contained herein, Willkie Farr & Gallagher LLP does not guarantee such accuracy and cannot be held liable for any errors in or any reliance upon this information. Under New York’s Code of Professional Responsibility, this material may constitute attorney advertising. Prior results do not guarantee a similar outcome. 40 Id. - 10 -
© Copyright 2026 Paperzz