Resources

Client Alerts, News Articles, Blog Posts, & Multimedia

Everything you need to know about BMD and the industry.

FTC Increases Targeting of Companies Lacking Cyber Protection

Client Alert

Here is how businesses can develop cyber strategies to mitigate breaches and financial risk.

The Federal Trade Commission (FTC) recently released a comprehensive cybersecurity report outlining key findings and recommendations based on emerging threats, trends in data breaches, and strategies for businesses to enhance their cybersecurity posture observed over the last year. The FTC strives to protect consumer privacy and respond to the evolving ways that companies use consumer data such as in the development of artificial intelligence models and misuse of health data. 

Importantly, the report emphasized the need for proactive measures to mitigate risks and highlighted the FTC’s initiative in targeting companies that fail to implement reasonable data security measures to protect consumer data. 

Here are some key strategies for businesses: 

  1. Risk Assessment and Management: Conduct regular risk assessments (at least annually) to identify potential vulnerabilities and prioritize them based on their potential impact on the business. Develop and implement a risk management plan to address these vulnerabilities effectively.
  2. Cyber Security Policies and Procedures:  Implement basic cybersecurity policies to protect its assets, data, and operations from cyber threats.
  3. Employee Training and Awareness: Educate employees about cybersecurity best practices, such as recognizing phishing emails, using strong passwords, and reporting suspicious activity. Regular training exercises help reinforce awareness.
  4. Access Control and Privilege Management: Implement strong access controls to limit user privileges and restrict access to sensitive data and systems. Use multi-factor authentication (MFA) where possible to add an extra layer of security.
  5. Data Encryption: Encrypt sensitive data to protect it from unauthorized access. 
  6. Patching: Keep software and systems up to date with the latest security patches to address known vulnerabilities. Establish a patch management process to ensure timely deployment of patches across the organization.
  7. Network Security: Deploy firewalls, intrusion detection/prevention systems, and other network security measures to monitor and protect against unauthorized access and malicious activity. Segment networks to limit the spread of potential breaches.
  8. Incident Response Plan: Develop a comprehensive incident response plan that outlines procedures for detecting, containing, and mitigating cybersecurity incidents. Test the plan regularly through tabletop exercises and simulations.
  9. Vendor Risk Management: Assess the security practices of third-party vendors and service providers to ensure they meet your organization's security standards. Include contractual clauses that outline security requirements and responsibilities.
  10. 10. Cyber Insurance: Consider obtaining cyber insurance to mitigate financial risks associated with cybersecurity incidents, such as data breaches or business interruptions.

By adopting a proactive approach to cybersecurity and implementing these strategies, businesses can enhance their cybersecurity posture and better protect themselves against evolving threats and complying with ever increasing legal obligations.  

BMD assists companies design and implement a strategy to achieve technical and organizational controls to bolster cybersecurity and data protection.  

If you have any questions regarding this topic and how to protect your company's data, please contact BMD Member Brandon Pauley at btpauley@bmdllc.com.


Did You Receive More than $750,000 in Provider Relief Funds?

The Provider Relief Funds (“PRF”) - authorized under the CARES Act - has been a vital tool for health care providers during the COVID-19 public health emergency. These funds have allowed providers to stay open and continue to offer care during these pressing times. While helpful, these funds do come with several important obligations. First, fund recipients are required to comply with certain record-keeping requirements as well as comply with certain balance billing prohibitions. See our Client Alert. Second, fund recipients are required to report their intent, use of funds, and other data elements, which helps promote transparency to the federal government. Please see our Client Alert on provider relief fund reporting requirements. Third, and perhaps a new concept for many providers, fund recipients of more than $750,000 must undergo a “single audit” to ensure program compliance and appropriate use of funds.

Important Updates Every Provider Should Know: Information Blocking

In December 2016, Congress passed the 21st Century Cures Act (“Cures Act”) which: (1) authorized funding for the National Institutes of Health to promote medical research and drug development, (2) implemented provisions aimed at addressing the prevention and treatment of mental illness and substance abuse, and (3) reformed certain standards of the Medicare program and federal tax laws to foster healthcare access and quality improvement.

PPP Update: Loan Necessity Questionnaires

On October 26, 2020, the Small Business Administration (“SBA”) published a notice in the Federal Register which foreshadowed the release of two new forms seeking information from for-profit and nonprofit organizations that received Paycheck Protection Program (“PPP”) loans of $2 million or more. If approved, the SBA would use information from these forms to evaluate and determine whether economic uncertainty made a PPP loan request necessary.

Exposure to COVID-19 Flow Chart

Exposure to COVID-19 Flow Chart

Lessons Learned: Five Tips for Buying or Selling a Practice

If you are anticipating buying or selling a practice during the coming months, you are not alone. The healthcare industry is experiencing a wave of integration. In fact, it has been occurring for several years. Many transactional healthcare attorneys have negotiated and closed dozens of these transactions for clients. They have negotiated on behalf of the sellers in some cases and the buyers in others.