Close X
Attorney Spotlight

How does Jessie Zeigler anticipate the intersection of privacy and smart technology will impact the future of litigation? Find out more>

Search

Close X

Experience

Search our Experience

Experience Spotlight

Primary Care Providers Win Challenge of CMS Interpretation of Enhanced Payment Law

With the help and support of the Tennessee Medical Association, 21 Tennessee physicians of underserved communities joined together and retained Bass, Berry & Sims to file suit against the Centers for Medicare & Medicaid Services to stop improper collection efforts. Our team, led by David King, was successful in halting efforts to recoup TennCare payments that were used legitimately to expand services in communities that needed them. Read more

Tennessee Medical Association & Bass, Berry & Sims

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Healthcare Private Equity Compliance Checklist

The complex and ever-changing healthcare regulatory and enforcement environment, including increased focus on the role of private equity firms in their portfolio companies, make compliance a top priority for private equity firms investing in healthcare companies. The best way to limit your exposure as a private equity firm is to avoid a compliance misstep in the first place. Additionally, an effective and robust compliance program for your portfolio healthcare company makes it much more attractive to potential buyers and helps you avoid an unexpected and costly investigation or valuation hit down the road. Download the Healthcare Private Equity Compliance Checklist to assess whether your portfolio company's compliance program is up-to-date.

Click here to download the checklist.

Privacy Perils: Beware New Hacker Scheme Requesting Employee W-2 Information

Firm Publication

Publications

March 25, 2016

During the past few weeks, many companies have been targeted by an email phishing scheme that has resulted in the disclosure of employees' confidential personal information. In this latest scheme, cybercriminals pose as company executives in an email targeted at members of the company's human resources (HR), accounting or payroll departments. In the email, the alleged executive requests employees' personal information, particularly W-2 or payroll information. The fraud perpetrator then uses that personal information to file fraudulent tax returns, and receive improper tax refunds, in the name of the employee.

To prevent falling victim to this scheme, you should quickly alert your employees and staff members, especially those in HR, accounting and payroll, to closely scrutinize any request for personal information. At a minimum, we recommend that you inform employees and staff members to do the following if a suspicious email is received:

  1. call the sender of the email requesting the information and verify that he or she indeed made the request (e.g., if the email appears to come from "Jane Doe, CEO," call Jane Doe to verify before sending any requested information); and
  2. rather than replying to the original email, only send the requested information by composing a new email message to a known email address for the sender (e.g., compose an email to Jane Doe, using her known email address from the company directory).

Disclosing sensitive and valuable information can cause significant costs and expenses triggered by federal and state data privacy and security laws, including the costs of complying with data breach notification requirements. To read more about this latest scheme, read the alert issued by the IRS or the client alert distributed yesterday by Bass, Berry & Sims.

UPDATE: A prominent and highly-respected law firm announced on Wednesday, April 6, 2016 it too had fallen victim to the "W-2 Phishing Scam" sweeping the country. The announcement re-emphasizes the point that no person or company is immune from a data breach. Even the most formidable and sophisticated firewalls and software cannot prevent a resourceful "black hat." The first line of cyberliability defense is a knowledgeable and wary workforce. Dedicated cybersecurity education, targeted training and individual vigilance are a hacker's worst enemy.

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.

 


Related Services

Notice

Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.