Close X
Attorney Spotlight

What television show influenced Chad Jarboe's decision to pursue a career in the legal field? Find out more>

Search

Close X

Experience

Search our Experience

Experience Spotlight

Primary Care Providers Win Challenge of CMS Interpretation of Enhanced Payment Law

With the help and support of the Tennessee Medical Association, 21 Tennessee physicians of underserved communities joined together and retained Bass, Berry & Sims to file suit against the Centers for Medicare & Medicaid Services to stop improper collection efforts. Our team, led by David King, was successful in halting efforts to recoup TennCare payments that were used legitimately to expand services in communities that needed them. Read more

Tennessee Medical Association & Bass, Berry & Sims

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Healthcare Transactions: Year in Review 2018Last year, CVS Health Corp. (NYSE: CVS) announced it would purchase health insurer Aetna Inc. (NYSE: AET) for $67.5 billion, a transaction that would be one of the biggest healthcare mergers in the past decade. The transaction raises an intriguing question: is this the beginning of a transformational shift in healthcare?

Recently, members of our healthcare group authored the Healthcare Transactions: Year in Review outlining 2017 M&A activity and drivers in the following hot healthcare sectors:

• Managed Care
• Hospitals
• Post-Acute Care—Home Health & Hospice
• Ambulatory Surgery Centers (ASCs)
• Healthcare Information Technology (HIT)
• Behavioral Health
• Physician Practice Management

Read now

Privacy Perils: Threats of Hacktivism

Firm Publication

Publications

January 22, 2016

Hacktivism is defined as the act of breaking into a computer system to promote a political or social agenda. This behavior can be used to punish a business for what the hacker sees as unethical behavior or can be used to garner attention to the hacker's "cause" and spread a message to the widest possible audience. Unfortunately, this type of behavior has become quite commonplace in today's culture. In October 2015, a teenager hacked the AOL account of the director of the CIA to call attention to violence in Palestine; in early November 2015, ISIS hacked approximately 54,000 Twitter accounts to post personal information of the heads of the CIA and FBI; in December 2015 the website of an international architecture firm was hacked by an Islamic group called Green Hat, which posted a 14–minute video touting Islam and Sharia law, and questioning other religious faiths.

These and other cyber hacks have prompted more discussion of the fine line between political activism and cyber-terrorism. Whether characterized as political or criminal, most observers agree the frequency and scope of hacktivism is likely to increase. In this environment, businesses would be well-advised to reexamine the security of their websites and social media accounts. In addition, every company should have a plan in place for immediately addressing the negative attention it undoubtedly will receive in the unfortunate event it becomes a hacktivism victim.

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.

 


Related Services

Notice

Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.