Skip to main content
Top Button

The Ice Miller Blog

The Burden of Encryption or the Burden of a Breach?

July 10, 2014 by Nicholas R. Merker, Partner
The single largest PHI breach in 2013 involved the theft of four desktop computers from an office; the computers contained more than four million patient records. The additional burden of encrypting that data almost certainly pales in comparison to the burden of notifying millions of patients, going through the investigation and monetary penalties that will probably result, and defending the class action lawsuit that has already been filed.

Could a Misdemeanor Guilty Plea Impact Your License to Practice Medicine?

July 9, 2014 by Myra C. Selby,
Another collateral consequence of a guilty plea, even to a misdemeanor, is disciplinary action against your license to practice medicine in any state in which you hold a license. 

Supreme Court Agrees to Consider Constitutional Authority of Bankruptcy Courts a Third Time

July 3, 2014 by Tyson A. Crist, Partner
Certiorari granted to review Seventh Circuit decision

I was wrong.  The saga continues.  In my last post I predicted it would be another seventeen years or so—another cicada cycle—until we heard from the Supreme Court again on the constitutional authority of bankruptcy courts, following the somewhat curt decision in Executive Benefits Insurance Agency v. Arkison issued on June 9, 2014.  Instead, it will be later this year or next.

Congratulations to the Indianapolis Airport Authority on receiving Service Quality Award

June 30, 2014
Ice Miller would like to congratulate our client, the Indianapolis Airport Authority, for being recognized for the second straight year, as North America’s top airport in terms of passenger satisfaction.

Ice Miller to Sponsor SHRM VIP Breakfast with Tom Peters

June 24, 2014
Ice Miller is proud to sponsor the 2014 SHRM VIP Breakfast on Wed. August 27 at 8:00 AM at the Indiana State Museum with special guest Tom Peters.  

The Difference Between Encryption and Password Protection of Patient Information

June 19, 2014 by Sherry A. Fabina-Abney, Partner
As you may already know, encryption is not the same as password protection. It’s a good idea to use a password to protect any device that contains PHI, but that is not sufficient to protect the PHI from unauthorized access.

Displaying results 231-236 (of 236)
 |<  <  15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 >  >|
View Full Site View Mobile Optimized