Close X
Attorney Spotlight

How does Jessie Zeigler anticipate the intersection of privacy and smart technology will impact the future of litigation? Find out more>


Close X


Search our Experience

Experience Spotlight

Primary Care Providers Win Challenge of CMS Interpretation of Enhanced Payment Law

With the help and support of the Tennessee Medical Association, 21 Tennessee physicians of underserved communities joined together and retained Bass, Berry & Sims to file suit against the Centers for Medicare & Medicaid Services to stop improper collection efforts. Our team, led by David King, was successful in halting efforts to recoup TennCare payments that were used legitimately to expand services in communities that needed them. Read more

Tennessee Medical Association & Bass, Berry & Sims

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Healthcare Private Equity Compliance Checklist

The complex and ever-changing healthcare regulatory and enforcement environment, including increased focus on the role of private equity firms in their portfolio companies, make compliance a top priority for private equity firms investing in healthcare companies. The best way to limit your exposure as a private equity firm is to avoid a compliance misstep in the first place. Additionally, an effective and robust compliance program for your portfolio healthcare company makes it much more attractive to potential buyers and helps you avoid an unexpected and costly investigation or valuation hit down the road. Download the Healthcare Private Equity Compliance Checklist to assess whether your portfolio company's compliance program is up-to-date.

Click here to download the checklist.

Privacy Perils: The Real Taxman Cometh

Firm Publication


April 15, 2016

As we near America's favorite Tax Day "holiday," which falls on April 18 this year, tax payers are reminded to be mindful of potential tax scams. Tax scams can come in multiple forms, including (1) filing fraudulent tax returns using another individual's information, (2) posing as an Internal Revenue Service (IRS) agent to solicit sensitive information from an individual or to demand payment of a fine, or (3) using viruses and other types of malicious code to obtain sensitive information. Ultimately, each of these scams attempts to defraud an individual of either money or sensitive information for illicit purposes. To avoid falling victim to one of these scams as the individual tax filing deadline approaches, consider these tips:

  • Be mindful of "spoofed" websites and/or emails that look official but are not. Be on the lookout for extra letters in words or strange characters in a URL or email address. Suspected scam emails can be forwarded to the IRS at, and additional information and reporting options can be obtained at For more information on phishing scams, please read our previous alert discussing an active hacker scheme that resulted in the release of employees' W-2 information. 
  • Do not be fooled by unsolicited phone calls – the IRS will never: (1) call to demand immediate payment, (2) demand that you pay taxes without giving you the opportunity to question or appeal the amount, (3) require you to use a specific payment method, (4) ask for credit or debit card numbers over the phone, or (5) threaten to involve law enforcement groups.
  • If your telephone Caller ID indicates that an individual is an IRS agent, but you are not sure, ask for the agent's name. Then, hang up and call the IRS (or applicable state tax agency) using a phone number from the agency's official website (which should be a website associated with a .gov domain name) and request to speak to the agent.

The IRS shares information regarding recent tax scams on its website at, and individuals can report potential tax scams at Additionally, if you believe that you have been the victim of a tax scam, the Federal Trade Commission provides a helpful walkthrough for reporting the suspected identify theft and steps to recovery at

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.


Related Services


Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.