Close X
Attorney Spotlight

How did an interest in healthcare policy lead Robert Platt to a career in the law? Find out more>

Search

Close X

Experience

Search our Experience

Experience Spotlight

Primary Care Providers Win Challenge of CMS Interpretation of Enhanced Payment Law

With the help and support of the Tennessee Medical Association, 21 Tennessee physicians of underserved communities joined together and retained Bass, Berry & Sims to file suit against the Centers for Medicare & Medicaid Services to stop improper collection efforts. Our team, led by David King, was successful in halting efforts to recoup TennCare payments that were used legitimately to expand services in communities that needed them. Read more

Tennessee Medical Association & Bass, Berry & Sims

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Six Things to Know Before Buying a Physician Practice spotlight

Dermatology, ophthalmology, radiology, urology…the list goes on. Yet, in any physician practice management transaction, there are six key considerations that apply and, if not carefully managed, can derail a transaction. Download the 6 Things to Know Before Buying a Physician Practice to keep your physician practice management transactions on track.

Click here to download the guide.

Obama Administration Releases Long-Awaited Cybersecurity Guidelines and Recommendations

Publications

February 13, 2014

On February 12, 2014, exactly one year after issuing an Executive Order directing the National Institute of Standards and Technology (NIST) to develop a framework for promoting cybersecurity, the Obama administration released the final version of NIST's guidelines for cybersecurity standards and practices. Spanning over 40 pages, the "Framework for Improving Critical Infrastructure Cybersecurity" (FICIC) (Version 1.0) sets out a series of best practices for protection of a business' systems again cyber intrusion and other cyber risks. The FICIC closely follows the recommendations found in the preliminary draft issued by the NIST on October 22, 2013.

The new guidance, particularly directed at the nation's critical infrastructure (including financial institutions), is based on the core principles of cybersecurity – identification, protection, detection, response and remediation. Rather than resting on repetition of these general concepts, the FICIC drills down through several levels, detailing steps a business should take to protect the integrity of its systems and data. In addition, the FICIC organizes businesses into four tiers based on their awareness of cyber risks, and their preparedness to address those risks. The FICIC is accompanied by a nine page "Roadmap for Improving Critical Infrastructure Cybersecurity," known as the "roadmap," outlining the NIST's next steps and areas in need of further attention and improvement.

Borrowing from existing standards and stressing the "flexibility" of the new guidelines, the President's Assistant for Homeland Security and Counterterrorism characterized the FICIC as a "common language" to discuss cybersecurity. The White House further emphasized that the FICIC is a "living document" to align cybersecurity practices with the business sector and adapt to the ever-changing cyberliability landscape. 

The framework provides concrete recommendations regarding cybersecurity issues that are useful guideposts for companies and organizations to improve their policies and procedures, especially when used in conjunction with other industry standards and guidance. In particular, the framework provides specific direction for conducting and documenting periodic risk assessments. Both the framework and the roadmap may be updated and strengthened over the next 90 days to establish milestones and accountability for implementation, and to address certain areas that are noticeably absent, such as information sharing.

Although voluntary, businesses should pay close attention to the recommendations set forth in the FICIC, as they are likely to be identified as industry best practices, effectively setting the standards for evaluating a company’s cybersecurity plan. Failure to follow, much less consider, the guidelines in the FICIC may put a business at risk for cyber intrusion, decrease its ability to remain competitive, and likely will be cited as damaging evidence in a lawsuit or regulatory investigation.

Our Data Security, Privacy and Cyberliability team has extensive experience dealing with cyber incidents, and in providing practical advice to companies seeking to maximize their cybersecurity and minimize their cyberliability exposure. We welcome your questions about the FICIC, as well as any other aspect of cybersecurity risks, principles, or procedures.

For more information about the content of this alert, please contact one of the authors.


Related Professionals

Related Services

Notice

Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.