Firm: All
Practice Industry: Healthcare & Pharmaceuticals, Technology
Region: All
Country/ State: All
Tag: All
Hunton Andrews Kurth LLP | December 2012

On November 16, 2012, European Data Protection Supervisor Peter Hustinx published an Opinion on the European Commission’s Communication on cloud computing (part of the Commission’s broader cloud computing strategy) ...

Waller | January 2013

A small nonprofit hospice in Idaho became the first healthcare provider to settle a potential violation of the HIPAA Security Rule affecting fewer than 500 individuals. On January 2, 2013, Hospice of North Idaho agreed to a settlement in the amount of $50,000 with the Department of Health and Human Services, Office of Civil Rights (OCR) following an investigation relating to a 2010 breach involving a stolen, unencrypted laptop containing patient information ...

Waller | January 2013

Omnibus HIPAA Rule, Including Significant Breach Notification Rule Changes, Released by HHS - The long-awaited final rule modifying the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules (the Rule) was released on January 17, 2013 by the Department of Health and Human Services (HHS) ...

Waller | January 2013

Legislators filed bills before the official start date of the 83rd Texas Legislative  Session; many of the bills already filed  address healthcare issues. 1. The Budget. Texas legislative leaders  recently approved a self-imposed  budget cap for the 2014-2015  biennium based on a conservative  estimate of growth in the state’s  economy, holding lawmakers to not  more than a 10 ...

Hunton Andrews Kurth LLP | January 2013

The wait is over. On January 17, 2013, the Department of Health and Human Services’ ("HHS’") Office for Civil Rights ("OCR") released its long-anticipated megarule ("Omnibus Rule") amending the HIPAA Privacy, Security, Breach Notification and Enforcement Rules. These amendments implement and expand on the requirements of the Health Information Technology for Economic and Clinical Health ("HITECH") Act and the Genetic Information Nondiscrimination Act of 2008 ...

Haynes and Boone, LLP | January 2013

The long awaited Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Regulation amendments (the “Changes”) to incorporate the changes made by Health Information Technologyfor Economic and Clinical Health (HITECH) in 2009 as part of the American Recovery and Reinvestment Act and by the Genetic Information Nondiscrimination Act (“GINA”) were recently released ...

Haynes and Boone, LLP | January 2013

Under the Patient Protection and Affordable Care Act (“PPACA”), an employer that employs an average of at least 50 full-time and full-time equivalent employees (a “Large Employer”) during 2013 may be subject to a penalty in 2014 if the Large Employer fails to offer “minimum essential coverage” to all but 5 percent (or, if greater, five) of its full-time employees (“No Coverage Penalty”) ...

Waller | February 2013

A new program taking effect in March provides hospitals with a new option to secure funds for financing acquisitions and refinancing debt. On February 5, 2013, the Office of Hospital Facilities published a new rule that will enable qualifying hospitals to finance their acquisitions and/or refinance their existing debt with FHA insurance even if the hospitals do not have FHA-insured mortgages ...

Makarim & Taira S. | February 2013

Sixteen years since the enactment of Law No. 7 of 1996 regarding Food (“the 1996 Food Law”), the Government issued the new Food Law (ie Law No. 18 of 2012) (“Food Law”) on 18 October 2012, two days after World Food Day. The Food Law replaces The 1996 Food Law. The Food Law covers three significant areas which were not governed by the 1996 Food Law, ie imports of food; the halal requirement; and the establishment of a new non-ministerial agency in-charge of food matters ...

Makarim & Taira S. | February 2013

The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

It took thirteen years, four months, and five days of heated debates and passionate protests before the country’s first reproductive health law was passed. Four days shy of Christmas last year, President Aquino finally signed the 24-page bill into law. It is now Republic Act No. 10354 or The Responsible Parenthood and Reproductive Health Act of 2012 (RH Law). The passing of the RH Law, however, does by no means close this chapter of Philippine history ...

Hunton Andrews Kurth LLP | February 2013

On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...

ENSafrica | February 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

Waller | March 2013

Historically there has been relatively little enforcement focus on the typical physician-ownership model used by many ambulatory surgery centers (ASCs).  A qui tam lawsuit filed recently against an ambulatory surgery center company based in Nashville, however, indicates that qui tam relators are leaving no stone unturned as they look for cases. Although the federal government has declined to intervene in U.S. ex. rel Thomas Reed Simmons v. Meridian Surgical Partners, et ...

Haynes and Boone, LLP | March 2013

A federal court jury in Illinois found that nursing home operator Momence Meadows fraudulently billed Medicare and Medicaid for “worthless services” and falsely certified compliance with health care laws and regulations, resulting in $28 million in damages to the government. United States ex rel. Absher v. Momence Meadows Nursing Ctr., Inc., No. 2:04-cv-02289 (C.D. Ill. Feb. 8, 2013) ...

Shoosmiths LLP | March 2013

The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...

ENSafrica | March 2013

It’s well known that computer programs enjoy copyright protection - many have  also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...

ENSafrica | March 2013

There was an interesting decision in the US recently about the intellectual property (IP) implications of posting a photo on Twitter.   The facts were that a professional photographer by the name of Daniel Morel – a man who has apparently spent over 25 years in Haiti – posted dramatic photos of the earthquake that struck Haiti in January 2010 shortly after the event ...

ENSafrica | March 2013

Technology-rich South African companies and indeed inventors who have taken the brave step of filing foreign patents -will know that there are two ways of getting patent protection in Europe. The first is the national route, in other words filing a patent directly in the country or countries of interest. The second route is that of the European Patent ...

ENSafrica | March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’ ...

Waller | March 2013

Over the past decade, the Office of Inspector General for the Department of Health and Human Services (OIG) has repeatedly emphasized the important role that Boards of Directors play in ensuring that their organizations have robust and effective compliance programs. At the same time, state and federal law enforcement agencies have shown a growing interest in the role of healthcare Boards when they investigate organizations for suspected healthcare fraud ...

Waller | April 2013

In a significant victory for healthcare providers, the Sixth Circuit Court of Appeals on Monday overturned an $11.1 million False Claims Act (FCA) judgment against Atlanta-based medical imaging company MedQuest Associates, Inc. and three of its Nashville, Tennessee-area imaging facilities. The Court held that the company did not violate the FCA by failing to comply with Medicare supervising-physician regulations or Medicare enrollment regulations following a change of ownership ...

dots