Wearables and the Future of Intellectual Property Law
BakerHostetler Partner Paul Karlsgodt Discusses Privacy Class Actions
Polsinelli Podcasts: Cloud Computing, From Cybersecurity to Confidentiality Issues
Investment Management Update - Focus on Data Privacy and Cybersecurity
IP|Trend: It’s Time to Get to Know the Federal Trade Commission
Polsinelli Podcast - Cybersecurity Threats - What Every Business Owner Should Know
Unique Privacy Concerns for Mobile Apps
Tips for Mobile App Privacy Compliance
Safeguards against Data Security Breaches (Part One)
New Technology = New Threats -
With new technology comes new security concerns. But when that new technology is in the medical field, the cybersecurity vulnerabilities can be particularly devastating.
Advanced Data Processing, Inc. and Intermedix Corp. were sued in federal court in Florida last week for violating the Health Insurance Portability and Accountability Act (HIPAA) for failing to protect the health information...more
Not to be left out, plaintiffs filed suit against CareFirst BlueCross Blue Shield late last week for the hacking incident the insurer suffered in May, which resulted in unknown intruders gaining access to names, dates of...more
Recent statutory amendments passed in California and Nevada expanding the definition of “personal information” will significantly impact the security measures businesses operating in these states must implement when handling...more
In response to a growing demand for cybersecurity guidance in the health care industry, the National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence, recently published a...more
Medical Informatics Engineering, Inc., an electronic medical record service provider, recently disclosed a data breach affecting approximately 4 million individuals. Within days of the disclosure, Medical Informatics was hit...more
The National Institute of Standards and Technology (NIST) cybersecurity center released a draft guide last week for health IT professionals to use to bolster security for the use of mobile devices in the health care industry....more
On July 25, 2015, Healthfirst Inc. notified approximately 5,300 of its members that their information may have been compromised during a criminal fraud scheme perpetrated against it. The fraudulent scheme was discovered by...more
California’s data security statute will get a little more “personal” as of January 1, thanks to a recently-passed amendment revising the definition of covered personal information. On July 14 California expanded the...more
As the number of highly publicized data breaches continues to skyrocket and proposals for a federal data breach notification law stagnate, state legislatures around the country have been busy amending their own breach...more
We previously reported that UCLA suffered a data breach affecting 4.5 million patients. Days following the announcement of the breach, plaintiffs filed a proposed class action lawsuit against UCLA, alleging that UCLA should...more
On July 8, 2015, the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) and St. Elizabeth’s Medical Center (SEMC) located in Boston, Massachusetts entered into an agreement following an investigation...more
Adding to the long list of cyber hacking victims, the UCLA Health System announced on Friday (July 17, 2015) that it confirmed on May 5, 2015 that a cyber-attacker had accessed parts of UCLA Health’s network back to September...more
UCLA Health announced today that it was the victim of a cybersecurity attack. The press report disseminated by UCLA Health noted there is evidence that computer systems containing sensitive personal data and health data was...more
Blue Shield of California is sending out notification letters to 843 of its members advising them that as a result of a computer code update it made to its website, when members logged into their own accounts, they were able...more
Earlier this year, President Obama launched a high-profile “Precision Medicine Initiative” (PMI) to develop treatments, diagnostics, and prevention strategies tailored to the individual genetic characteristics of each...more
Many telehealth and mHealth app developers are concerned about whether or not their app is a medical device under FDA regulations (and rightfully so), they often pay less attention to the Health Insurance Portability and...more
New law will require consumer breach notice within 90 days, identity theft protection for consumers,“kill switch” for smartphones, and implementation of data security programs for certain health providers, state agencies and...more
The heat of summer may be upon us, but in Congress and in many state legislatures the attitude toward passing major data breach legislation has considerably cooled.
We predicted some months ago that 2015 might be the...more
Connecticut and Oregon were recently added to the increasing list of states adopting stricter laws addressing the handling of health information and penalties in connection with breaches of health information. Both states...more
In August of 2013, four computers of Advocate Health and Hospitals Corporation (Advocate Health) were stolen from one of its offices. The computers contained the names, dates of birth, Social Security numbers, health...more
In this Presentation:
- Internet of Things - definition
- But what is it all about?
- But not just that...
- The IoT market in figures...
- Beecham Research - view of the World
- The Connected...more
Electronic health record (EHR) vendor Medical Informatics Engineering and its subsidiary, NoMoreClipBoard, which is a personal health record (PHR) product, notified its EHR clients and PHR individuals that it has been the...more
The opinion from the Philadelphia Court of Common Pleas reinforces lack of standing as a defense for companies facing data breach–related class actions.
On March 25, the Philadelphia Court of Common Pleas provided...more
Nevada has amended its breach notification law, effective July 1, 2015, to include a medical or health insurance identification number and a user name, unique identifier, or e-mail address in combination with a password or...more
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top