By: Alaap Shah and Marshall Jackson
Data is going digital, devices are going mobile, and technology is revolutionizing how care is delivered. It seems to be business as usual, as your health care organization continues to digitize its operations. You have even taken measures to help guard against the “typical” risks such as lost laptops, thumb drives and other electronic devices. However, unbeknownst to you, hackers sit in front of their computers looking for ways into your network so that they may surreptitiously peruse through confidential financial records and sensitive ...
Blog Editors
Recent Updates
- In Confirmation Hearings, AG Nominee Pledges to Defend the Constitutionality of the False Claims Act
- A Primer on Executive Orders and a Preview of the Road Ahead
- At Long Last, DEA’s Remote Prescribing Rules 2.0 Are (Really) Here! (Pending Further Consideration by the Incoming Administration . . .)
- Massachusetts District Court Applies “But-For Causation” Standard, Dismisses AKS-Based FCA Case After Evaluating Facts and Circumstances of Independent Contractor Arrangements
- DOJ’s False Claims Act Recoveries Top $2.9 Billion in FY 2024, but Health Care Numbers Dip—What Could FY 2025 Hold for Health Care Enforcement?