Read Science, Computers & Technology updates, news, alerts, and legal analysis from leading lawyers and law firms:
Is Edward Snowden a Whistleblower?
Goldstein: Expect More Litigation in Wake of Myriad Gene Patent Decision
As More States Implement Social Media Password Laws, There’s Still Some Blind Spots
Patent Series: Protecting inventions
Trademark Series: Use-based trademark protection
Trademark Series: Protecting your mark from becoming generic
Trademark Series: Matching your commercial strategy
Trademark Series: Building a global brand
Mobile App Series: Privacy by Design
Unique Privacy Concerns for Mobile Apps
Instapundit: America's IP Laws Need to be "Pruned Back"
Unprecedented Global ATM Heist Presents a Number of Lessons for Companies
With Radical Changes, Law Firms Can Beat Recession
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Video Sharing App Vine Hit with Takedown Notice from Prince
Can You Patent Human Genes? ACLU Says No
Cybersecurity Lobbying Booming: How Law Firms Can Profit
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Your Employer Doesn’t Own Your LinkedIn Account, and They Shouldn’t Try To
HIPAA, as enacted in 1996, directed the U.S. Department of Health & Human Services (DHHS) to issue regulations requiring health plans to protect the privacy of health information and to provide reasonable and appropriate...more
Last month, Part One of this article addressed the role of traditional insurance in covering cyber risks. This second installment first continues the discussion of traditional insurance coverages and then addresses specialty...more
Two recent decisions emphasize yet again the value of defining and taking steps to protect a company’s trade secrets.
On May 16, 2013, Judge England issued a preliminary injunction in Farmers Insurance Exchange v....more
More and more companies are considering specialized cyber insurance policies to insure against cyber breaches.
License agreements often contain indemnities. An indemnity is a contractual obligation to step in and reimburse some financial obligation such as a liability, loss, or damage. In essence, the party giving the indemnity will...more
While much of the discussion around cybersecurity tends to focus on critical information sectors, national security, and the concerns of global corporations, data breaches can be just as devastating for small and medium-sized...more
Cyber Risks Faced by Small Business Owners -
Small business owners’ anxiety levels are in the red zone because of the barrage of news about hacking incidents that target businesses’ ongoing operations. While those...more
The cloud is all the rage these days. Cloud computing, that is.
When a business uses a cloud computing service, its data storage and application server needs are handled by a third party provider that it can connect to via...more
Weighing in at half the length of Tolstoy’s legendary tome War and Peace, it is no surprise that the thought of the impending deadline for compliance with the 538-page HIPAA Omnibus Rule has left many small clinical...more
OIG continues its aggressive interpretation of scope and effect of exclusion from participation in Federal health care programs and clarifies several open questions....more
The Office of the Inspector General (OIG) released a Special Fraud Alert on March 26, 2013 warning that physician-owned distributorships (PODs) are "inherently suspect" under the Anti-Kickback Statute (AKS). Generally...more
Since 2003, all but four states have enacted laws concerning data breaches and the protection of consumers’ personal information. This regulation of electronic data containing personal information and the protection of such...more
There’s no denying that the present-day Internet, while extraordinary, is increasingly scary. Cyber attacks of various types continue to escalate across the globe. As stated by one recent commentator: “Cybercrime is raging...more
The deadline for compliance with the new HIPAA Omnibus Rule is looming for group health plans. As explained in a prior blog, stiff penalties may be imposed on employers whose plans fail to comply. Accordingly, employers...more
In this issue:
- What Your Business Needs To Do About Hipaa — Now
- Action Items for Covered Entities and Business Associates (including Subcontractors)
- Changes Impacting Business Associates (including...more
In the April 10 Federal Register, two agencies within the U.S. Department of Health and Human Services published proposed rules that many healthcare providers have been anxiously awaiting affecting donations of electronic...more
On April 10, 2013, the Centers for Medicare and Medicaid Services (CMS) and the Office of the Inspector General of the U.S. Department of Health and Human Services (OIG) each published proposed rules in the Federal Register...more
The 340B Drug Pricing Program (340B Program) continues to undergo a period of intense scrutiny and debate over how compliance with program rules is enforced. As previously reported in the May 30, 2012 edition of Foley’s Legal...more
On April 17, 2013, the Office of Inspector General of the Department of Health and Human Services (“OIG”) released an Updated Provider Self-Disclosure Protocol (“SDP”). The Updated SDP replaces OIG’s original Provider...more
On April 12, 2013, the Center for Medicare and Medicaid Services (“CMS”) created the “Open Payments” website where reported information under Section 6002 of the Affordable Care Act (“ACA”), commonly referred to as the...more
The Centers for Medicare & Medicaid Services (“CMS”) recently launched the National Physician Payment Transparency Program: OPEN PAYMENTS website, which provides Sunshine Act compliance resources, including Fact Sheets and...more
On March 22, 2013, Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) Director Leon Rodriguez presented the keynote address to attendees of the American Health Lawyers’ Association HIPAA/HITECH Conference in...more
Insurance is one important line of defense companies can use to protect against the potentially devastating costs of responding to cyber breaches. The following list gives examples of insurance coverage to consider when...more
Many insurers are now offering “cyber liability” or “cyber risk” policies designed to protect policyholders against electronic injuries that policyholders may either suffer themselves or cause to others. Most of these...more
The Centers for Medicare and Medicaid Services (CMS) issued the final regulations on the U.S. Sunshine Act on February 8, 2013. Transparency Reports and Reporting of Physician Ownership or Investment Interests, 78 Fed. Reg....more
JD Supra gets your content noticed, increases your visibility and makes your marketing efforts hassle free...
Learn More or Schedule a demo