The Instance of the Revealing Envelope: HIPAA Confidentiality Obligations Extend Beyond Electronic Systems

​ The Instance of the Revealing Envelope: HIPAA Confidentiality Obligations Extend Beyond Electronic Systems By Saad Gul and Michael E. Slipsky Violations of the Health Insurance Portability and Accountability Act (HIPAA) generally involve comput ...[Read more]

Published: 8/25/2017 | 0  Comments | 0  Links to this post

Five Takeawars from the OCR Reminder on HIPAA Obligations In Ransomware Incidents

​ Five Takeaways from the OCR  Reminder on HIPAA Obligations In Ransomware Incidents   By Saad Gul and Michael E. Slipsky   Apparently prompted by the recent high-profile wave of ransomware attacks, the Department of Health and Human Services’ ...[Read more]

Published: 7/5/2017 | 0  Comments | 0  Links to this post

The WannaCry Affair: Three Cyberinsurance Related Tips for Clients

​ The WannaCry Affair: Three Cyberinsurance Related Tips for Clients   by Saad Gul and Michael E. Slipsky  As we previously noted, a recent ransomware attack crippled over 75,000 computers in over a 100 countries. The “WannaCry” appears to be the ...[Read more]

Published: 5/17/2017 | 0  Comments | 0  Links to this post

​​Wave ​of Ransomware Attacks Cripples Dozens of Institutions Worldwide including U.K.'s NHS

​ Wave of Ransomware Attacks Cripples Dozens of Institutions Worldwide Including Britain’s NHS   By Saad Gul and Michael E. Slipsky   Movie buffs are familiar with a favored narrative arc: something with tremendous power, such as the Ebola virus ...[Read more]

Published: 5/12/2017 | 0  Comments | 0  Links to this post

First HIPAA Settlement Involving Wireless Health Services Provider: $ 2.5 Million

​ First HIPAA Settlement Involving Wireless Health Services Provider: $ 2.5 Million   By Saad Gul and Michael E. Slipsky   We have previously written that the Internet of Things continues to spawn new cybersecurity and privacy concerns. These v ...[Read more]

Published: 4/26/2017 | 0  Comments | 0  Links to this post

Tracking the Data Bandits

by William R. Shenton and Saad Gul   In the iconic western, Butch Cassidy and the Sundance Kid, Butch and Sundance are hard pressed to evade a posse led by the semi-mythical lawman, Joe Lefors, who is so adept that he manages to track them across ...[Read more]

Published: 2/14/2017 | 0  Comments | 0  Links to this post

Five Highlights From OCR Guidance On HIPAA Compliance In Cloud Computing

The Department of Health and Human Services’ Office of Civil Rights (OCR) has issued guidelines for HIPAA-covered entities that utilize cloud computing in processing electronic protected health information (“ePHI”). The increased use of cloud comput ...[Read more]

Published: 10/20/2016 | 0  Comments | 0  Links to this post

About the Editors

​​Saad Gul, a former computer consultant, is a partner in Poyner Spruill's cyberlaw and privacy practice in Raleigh. Follow him on twitter @NC_Cyberlaw. Saad advises clients on a wide range of privacy, data security, and cyber liability issues, incl ...[Read more]

Published: 9/1/2016 | 0  Comments | 0  Links to this post