The General Medical Council has issued definitive guidance on doctors' duties when they fear a child in their care is suffering from abuse. The GMC's 2012 Guidance on Child Protection came into effect on 3 September 2012 after a two-year working group - chaired by a senior family court Judge, the Right Honourable Lord Justice Thorpe - listened to evidence given by child protection experts ...
On October 30, 2012, the U.S. District Court for the Southern District of California ruled that an opt-out confirmation text sent by Citibank (South Dakota), N.A. (“Citibank”) did not violate the Telephone Consumer Protection Act (“TCPA”). Under a “common sense” interpretation, the court determined that Citibank’s opt-out text does not demonstrate the type of invasion of privacy the TCPA seeks to prevent ...
On November 10, 2012, the German working group on technical and organizational data protection matters published guidelines (in German) on the technical and organizational separation requirements for automated data processing on shared IT systems (the “Guidelines”). The working group is part of the Conference of the German Data Protection Commissioners, which recently concluded its 84th Conference in Frankfurt (Oder) ...
The rapid growth of the hospice industry has attracted the attention of Congress and federal and state healthcare regulatory and enforcement agencies. The Patient Protection and Affordable Care Act (the “ACA”), signed into law by President Obama on March 23, 2010, included several provisions aimed at hospice providers ...
On November 26, 2012, the Department of Health and Human Services’ Office of Civil Rights (“OCR”) published guidance on the two methods for de-identifying protected health information (“PHI”) in accordance with the HIPAA Privacy Rule ...
What's all this about penguins, pandas and search engine optimisation? Optimising websites to rank highly in Google search results is a lucrative industry. For years, businesses have employed search engine optimisation (SEO) providers to boost rankings ...
Narrow Construction of Food & Drug Act Undermines FDA Regulation, Class Actions A divided panel of the Second Circuit Court of Appeals in New York overturned on First Amendment grounds the conviction of a pharmaceutical sales representative for conspiracy to introduce a misbranded drug into interstate commerce, an offense more commonly referred to as off-label marketing. The decision, United States v. Caronia, No. 09-5006-cr (2d Cir. Dec ...
The U.S. District Court for the Eastern District of Virginia recently overturned the United States Patent & Trademark Office ("USPTO") interpretation of the patent term adjustment ("PTA") statute in Exelixis, Inc. v. Kappos. Similar to Wyeth v. Kappos, where a previous USPTO interpretation of the PTA statute was overturned, the Exelixis decision promises to add months and even years to the patent term of many patents ...
According to a recent article by Shoosmiths, the cloud software market generated $22 billion in revenue in 2011, and expects growth to $67.3 billion by 2016 Alongside the benefit of cloud computing, however, lies a lack of transparency for cloud customers, causing legitimate concerns about how they can comply with the Data Protection Act 1998 (DPA) ...
On November 16, 2012, European Data Protection Supervisor Peter Hustinx published an Opinion on the European Commission’s Communication on cloud computing (part of the Commission’s broader cloud computing strategy) ...
The wait is over. On January 17, 2013, the Department of Health and Human Services’ ("HHS’") Office for Civil Rights ("OCR") released its long-anticipated megarule ("Omnibus Rule") amending the HIPAA Privacy, Security, Breach Notification and Enforcement Rules. These amendments implement and expand on the requirements of the Health Information Technology for Economic and Clinical Health ("HITECH") Act and the Genetic Information Nondiscrimination Act of 2008 ...
The long awaited Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Regulation amendments (the “Changes”) to incorporate the changes made by Health Information Technologyfor Economic and Clinical Health (HITECH) in 2009 as part of the American Recovery and Reinvestment Act and by the Genetic Information Nondiscrimination Act (“GINA”) were recently released ...
Under the Patient Protection and Affordable Care Act (“PPACA”), an employer that employs an average of at least 50 full-time and full-time equivalent employees (a “Large Employer”) during 2013 may be subject to a penalty in 2014 if the Large Employer fails to offer “minimum essential coverage” to all but 5 percent (or, if greater, five) of its full-time employees (“No Coverage Penalty”) ...
Sixteen years since the enactment of Law No. 7 of 1996 regarding Food (“the 1996 Food Law”), the Government issued the new Food Law (ie Law No. 18 of 2012) (“Food Law”) on 18 October 2012, two days after World Food Day. The Food Law replaces The 1996 Food Law. The Food Law covers three significant areas which were not governed by the 1996 Food Law, ie imports of food; the halal requirement; and the establishment of a new non-ministerial agency in-charge of food matters ...
The Government finally issued Government Regulation No. 82 of 2012 9regarding the Implementation of Electronic Systems and Electronic Transactions (“Regulation 82”) for Law No. 11 of 2008 regarding Electronic Information and Electronic Transactions (“Law No.11”). Regulation 82 sets out significant requirements in relation to electronic registration/certification, electronic systems, electronic transactions, electronics agents, electronic signatures and domain names ...
What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...
What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...
Data Privacy Act of 2012 The Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...
It took thirteen years, four months, and five days of heated debates and passionate protests before the country’s first reproductive health law was passed. Four days shy of Christmas last year, President Aquino finally signed the 24-page bill into law. It is now Republic Act No. 10354 or The Responsible Parenthood and Reproductive Health Act of 2012 (RH Law). The passing of the RH Law, however, does by no means close this chapter of Philippine history ...
On February 26, 2013, the National Institute of Standards and Technology ("NIST") issued a Request for Information ("RFI") to gather comments regarding the development of a framework to reduce cybersecurity risks to critical infrastructure. As we previously reported, the Obama Administration’s executive order, Improving Critical Infrastructure Cybersecurity (the "Executive Order"), released on February 12, 2013, directs NIST to coordinate development of this framework ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...
A federal court jury in Illinois found that nursing home operator Momence Meadows fraudulently billed Medicare and Medicaid for “worthless services” and falsely certified compliance with health care laws and regulations, resulting in $28 million in damages to the government. United States ex rel. Absher v. Momence Meadows Nursing Ctr., Inc., No. 2:04-cv-02289 (C.D. Ill. Feb. 8, 2013) ...
The collapse of systems integrator and reseller 2e2 in January has highlighted the danger for clients of companies such as 2e2, and focuses attention on how to deal with this type of situation. At a recent Shoosmiths event, data, IT and banking lawyers shared practical experience of the risks and potential remedies associated with insolvency of IT suppliers ...
It’s well known that computer programs enjoy copyright protection - many have also been patented, but that’s another story and I’m not going to deal with that here. The South African Copyright Act has protected computer programs as a specific category of works since 1992, although prior to that they were protected as ‘literary works’ ...