Managing Cyber Risks in Medical Practices
<b><I>Part Two of a Two-Part Article</I></b><p>Astonishing computing power lets health care providers harness vast computing resources to drive their business plans, manage treatment protocols and crunch data to boost their practices. However, unintended consequences arise and, in the case of computers, one such consequence is cyber peril.
Supreme Court Limits Forum Shopping with Plavix Lawsuit Decision
OnJune 19, the U.S. Supreme Court upended years of jurisprudence to hand corporations a gift: a far more stringent definition of specific jurisdiction that will force plaintiffs to bring suit in multiple state courts rather than join their claims to those in far-flung jurisdictions.
Do <b><I>Daubert</I></b> Motions Really Work?
<b><I>Part Three of a Three-Part Article</I></b><p>Last month, the author described two of his six tips for achieving success with <I>Daubert</I> motions. Here, he concludes by offering four more.
Bit Parts
Consumers' Digital Music Price-Fixing Suit Ruled No "Class" Act<br>Marshall Tucker Band's Former Manager Loses Bid for Attorney Fees After Prevailing in Trademark Action Brought Against It By the Band
Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
The ransomware attack on June 27 on DLA Piper sounded an alarm for Big Law. The world's biggest firms are just as prone to ransomware attacks as any other company, and the potential ramifications of a network-crippling malware infection are wide-ranging for a service industry that holds the legal fate of corporations in its palm.
Managing Cyber Risks in Medical Practices
<b><I>Part One of a Two-Part Article</I></b><p>We often associate cyber-risks with financial institutions, but while the financial sector certainly does deal with cyber-risks, it is by no means the only industry facing such woes. Health care providers are also vulnerable to cyber-liability risks.
Cybersecurity After WannaCry
Following the May 2017 WannaCry ransomware infiltration into over 10,000 organizations and individuals in over 150 countries, it is clear that businesses across industries have no choice but to spend time and resources digesting and culling through the cybersecurity information barrage.