MacEwen on BigLaw's 'Hollow Middle', Shaky Vereins & Dentons in China
Special Report: The Hot-ish Swag at LegalTech New York 2015
Is the Patent Litigation Boom Coming to an End?
What is Bitcoin 2.0?
Will 2015 Bring New Regulations for Bitcoin Users?
Waldman: Stop Immunizing Websites That Allow Harassment
A Moment of Simple Justice - Snitching Ain't Easy
Data Privacy: The Next Frontier of Corporate Compliance
What are the Implications of Alice v. CLS?
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
If you’ve ever left your mobile phone on an airplane, in a restaurant, or somewhere other than in your possession, you know it’s frightening enough to think of losing the device itself, which costs a premium, as well as your...more
The ICO has welcomed a change in legislation which came into effect on 1 February 2015 enabling it to audit National Health Service (NHS) bodies to check for compliance with the UK Data Protection Act 1998. ...more
On February 11, 2015, the U.S. District Court for the Southern District of Texas dismissed a class action complaint against the St. Joseph Health System arising out of a data security breach that occurred after hackers...more
The Office of Civil RIghts (“OCR”) recently announced that Phase 2 of the HIPAA audits would be further delayed because the audit portals and project management tools that are needed to initiate the audit process are not...more
Effective August 1, 2015, New Jersey will require health insurance carriers authorized to issue health benefit plans in New Jersey to encrypt personal information that they store electronically....more
Cyber Risk Insurance Policies: What You Need to Know -
Editor’s Note: As data breach incidents and related cyber risks continue to increase and gain publicity—and government agencies become more actively involved in...more
In This Issue:
- High Tech, High Risk: Protecting Health Plan Data: Recent Cyber Attack Reminds Employers to Take Swift Action
- EEOC FY 2014 Statistics Are Here: What Do They Mean for Employers?
White House Holds Summit On Cybersecurity And Consumer Protection — On February 13, 2015, leaders from throughout the country representing sectors with a stake in cybersecurity and consumer protection issues convened at...more
We welcome this guest blog by Gene Fry, Compliance Officer, Scrypt, Inc.
The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data. This means that any...more
All covered entities that discovered security breaches under the Health Insurance Portability and Accountability Act (“HIPAA”) in 2014 should be aware of an upcoming reporting deadline. ...more
The EU Article 29 Working Party (“WP29”) has published a letter to the European Commission (“EC”) on the scope of health data in relation to lifestyle and well-being apps, following the EC’s Working Document on mHealth and...more
On February 11, 2015, the U.S. District Court for the Southern District of Texas held that a plaintiff lacked standing to pursue claims for alleged violations of the Fair Credit Reporting Act, 15 U.S.C. § 1681 et seq....more
On January 27, 2015, the House Energy & Commerce Committee (“Committee”) released a discussion draft of comprehensive medical innovation reform legislation as part of its 21st Century Cures Initiative. According to supporting...more
As more and more providers adopt electronic health records (“EHRs”) systems (and with new regulations concerning their required use for purposes of Medicare billing for chronic care management, their popularity can only...more
March 1, 2015 is the deadline for providing notification to the Secretary of the Department of Health and Human Services regarding breaches of unsecured protected health information that were discovered in the 2014 calendar...more
Dismissing a class action based on a data breach, the Southern District of Texas added to the growing number of decisions that find an alleged risk of future identity theft due to a data breach is not an injury that creates...more
Data breaches are at the forefront of the news, and many companies, including those dominant in the health care industry, have found themselves front and center in the headlines. Although recent news stories have focused...more
As a follow-up to its announcement of a massive cyber breach last week, Anthem has updated its “Frequently Asked Questions” for its employer clients, which are posted at www.AnthemFacts.com. The most significant development...more
Setting a new standard for encryption, New Jersey has enacted a new law (P.L. 2014, c. 88, codified at N.J. Stat. Ann. §§ 56:8-196 - 56:8-198) effective August 1, 2015, requiring health insurance carriers authorized to issue...more
We have all heard about the burgeoning opportunities tied to the development of precision medicine (also called “personalized medicine”), which includes the use of an individual’s genetic information to design targeted...more
Unfortunately, account hacks and data breaches are nothing new. Every day, we hear reports of hackers compromising networks and their protected data. When it happens on a massive scale to a powerful player in the health...more
Anthem, formerly known as WellPoint, announced on Wednesday that its database had been hacked, exposing the personal information of as many as 80 million individuals. According to Anthem, the information accessed included...more
Almost all healthcare providers and health plan administrators are familiar with the detailed requirements of the privacy and security rules under the Health Insurance Portability and Accountability Act (HIPAA). Violations...more
Anthem, one of the nation’s largest health insurers, announced last Wednesday that it had been attacked by cyber hackers and that personal information for as many as 80 million individuals had been compromised....more
In a recently released report titled “Sharing Clinical Data – Maximizing Benefits, Minimizing Risks,” the U.S. Institute of Medicine (IOM) has called for more clinical trial data transparency. Historically, participant-level...more
Find a Science, Computers & Technology Author »
Back to Top