Close X
Attorney Spotlight

How did an interest in healthcare policy lead Robert Platt to a career in the law? Find out more>


Close X


Search our Experience

Experience Spotlight

Envision to Sell to KKR for $9.9 Billion

We represented Envision Healthcare Corporation (NYSE: EVHC) in its definitive agreement to sell to KKR in an all-cash transaction for $9.9 billion, including debt. KKR will pay $46 per Envision share in cash to buy the company, marking a 32 percent premium to the company's volume-weighted average share price from November 1, when Envision announced it was considering its options. The transaction is expected to close the fourth quarter of 2018. Read more

Envision Healthcare

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Six Things to Know Before Buying a Physician Practice spotlight

Dermatology, ophthalmology, radiology, urology…the list goes on. Yet, in any physician practice management transaction, there are six key considerations that apply and, if not carefully managed, can derail a transaction. Download the 6 Things to Know Before Buying a Physician Practice to keep your physician practice management transactions on track.

Click here to download the guide.

Privacy Perils: Avoiding the Spectre of a Meltdown

Firm Publication


January 26, 2018

You recently may have heard news reports regarding new security threats known as "Meltdown" and "Spectre." Not to be mistaken for the latest Hollywood box-office offering, these new threats allow attackers to exploit a design flaw in microprocessors (i.e., the chips that power your computer, tablet, smartphone or other electronic devices) to access and steal data stored in the working memory of shared servers and individual devices vulnerable to attack. (For more information, Red Hat has provided an easy-to-follow video of how Meltdown and Spectre could impact you.) Put simply, the flaws allow an illicit actor to dig through the data dumpster for your device in hopes of discovering something valuable like user names and passwords. To date, no companies or government cybersecurity agencies have reported any significant breaches related to these new threats. Nevertheless, many software and hardware companies have moved quickly to roll out software patches and updates aimed at preventing or mitigating the threat of these exposed flaws.

To help mitigate your exposure, software and hardware companies are strongly encouraging individuals to install the latest patches or updates made available to you. It is important that you proactively install any such updates on your personal computers, smartphones, tablets, etc., especially if updates are not automatically pushed to your respective devices. (Some reports have indicated that the haste to push these patches and updates may, in some instances, cause bigger problems than the flaw itself. However, until clearly advised otherwise by the author of the patch, best practice is to install, rather than forestall, updates.)

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.

Related Services


Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.