Orrick's Financial Industry Week in Review - March 31, 2014
Fed Issues a Report on Mobile Financial Services - On March 25, the Fed issued a report on the use of mobile phones to obtain financial services. Last year, 33 percent of all mobile phone users and 51...
View ArticlePrivacy Monday – March 31, 2014 OPENING DAY!
Last Monday in March (Opening Day for you baseball fans) - some privacy/security bits and bytes to close out the month....By: Mintz Levin - Privacy & Security Matters
View ArticleHHS's New Security Risk Tool for HIPAA Compliance
On March 28, 2014, the HHS Office of the National Coordinator for Health Information Technology (ONC), in conjunction with the HHS Office for Civil Rights (OCR), released a Security Risk Assessment...
View ArticleThe Government Is Here To Help: HHS Releases HIPAA Security Risk Assessment...
The U.S. Department of Health and Human Services ("HHS") has just released a new security risk assessment ("SRA") tool to assist small and medium sized health care practices (one to ten providers)...
View ArticleAustralian Businesses Supplying Electronic, Telecoms And Broadcasting...
EU VAT CHANGES FOR E-COMMERCE SERVICES - Australian e-commerce businesses that supply services to European customers need to be aware of important "value added tax" ("VAT") changes that will apply...
View ArticleSIPO Announces GUI Related Design Becomes Patentable Subject Matter as of May...
Recently announced by the State Intellectual Property Office of China (SIPO), graphical user interface (GUI) design patent applications will be accepted beginning on May 1, 2014. Revised on March 17,...
View ArticleCompliance is No Joke: OCR Releases Security Risk Assessment Tool
On March 28, 2014, the Office of Civil Rights (OCR) announced the release of an online and iPad app-based security risk assessment (SRA) tool. The tool is intended to help health care providers in...
View Article[Video] Did the IRS Just Help or Hurt the Bitcoin Economy?
Apr. 1, 2014 -- Houman Shadab, Associate Professor at New York Law School, talks with Lee Pacchia about recent developments in the bitcoin economy....By: Mimesis Law
View ArticleBrand Wars: Will the Real Ronald McDonald Please Stand Up (and Eat a Taco...
Last week, Taco Bell released a TV commercial featuring real men named Ronald McDonald enjoying Taco Bell’s new breakfast items. This is very creative advertising, but is not for the faint of heart....
View ArticleFCC Restricts Same Market TV Joint Sales Agreements; Begins Quadrennial...
At its Open Meeting today, the Federal Communications Commission (FCC) voted to issue a Report & Order as well as a Further Notice of Proposed Rule Making (FNPRM) in its required “Quadrennial...
View ArticleWhat do "Abacus Guy," Mom, and Computers That Say "Stop!" Have in Common?...
Nine Justices of the Supreme Court and three oral advocates held over 100 spectators at bay for just over an hour as they debated—of all things—patents. Yesterday’s case, Alice Corp. vs. CLS Bank, was...
View ArticleThe Umpire Strikes Back: European Court Rules That ISPs Can Be Forced to...
On March 27, 2014, the highest court in the European Union—the Court of Justice for the European Union (CJEU)—decided that copyright owners have the right to seek injunctions against Internet service...
View ArticleSupreme Court Grants Certiorari in Teva Pharmaceuticals v. Sandoz
Earlier today, the Supreme Court granted certiorari in the Teva Pharmaceuticals USA, Inc. v. Sandoz Inc. case (Supreme Court docket number 13-854). The sole issue on appeal is encapsulated by the...
View ArticleSecurity Rule Compliance: The Importance of Performing Regular Risk Analyses
It is likely that you are familiar with the HIPAA Security Rule’s mandate that covered entities and business associates document the decision making process that led to the selection of their means to...
View ArticleHIPAA Security Risk Analyses
As noted in Paul Kim and Hannah Whitman Clark's article regarding HIPAA Security Risk Analyses, CEs and BAs are required to review and update their risk assessments only under certain conditions after...
View ArticleYou're Not Immune: Hackers Target Health Care Providers Of All Shapes & Sizes
For health care providers, exposure to cyberattacks is becoming a stark reality. Findings in a recently released Health Care Cyberthreat Report by cybersecurity leaders confirmed the health care...
View ArticleFederal Court Calls General Partnership Interest A Security
Are general partnership agreements for oil and gas exploration considered “securities” governed by federal securities regulations? The U.S. Court of Appeals for the 10th Circuit thinks they could be....
View ArticleLaw Firms Are Prime Information-Security Targets
Law firms do not hold special immunity from the threat of cybercriminals. In fact, law firms should be extra vigilant, considering the breadth of sensitive client information they often possess...
View ArticleMobile Medical App Regulations on the Move – Proposed Bills To Further Alter...
Apple’s apps store lists close to a 100,000 health apps. Together with wearable technology, direct-to-consumer testing services, and greater consumer participation in the decision to purchase health...
View ArticleWritten description for functional limitations in view of Alcon Research Ltd....
Alcon owns US 5,631,287 (‘287), of which Claim 1 recites “[a] method of enhancing the chemical stability of an aqueous composition comprising a therapeutically-effective amount of a prostaglandin,...
View Article