Posts tagged healthcare.
Blogs
Clock 3 minute read

We recently wrote about proposed Oregon legislation that would have addressed workplace violence in healthcare settings but failed to move forward in the legislature due to concerns about a provision that would have made assault on a hospital worker punishable as a felony.

This was not a concern that troubled the Kentucky legislature, which on March 27, 2024, signed and delivered to the state governor a bill relating to workplace violence against healthcare workers. The Kentucky legislation expands the offense of assault in the third degree perpetrated against a variety of ...

Blogs
Clock 4 minute read

What is the 8 and 80 overtime system?

The Fair Labor Standards Act (“FLSA”) generally requires covered employers to pay non-exempt employees overtime for all hours worked over 40 hours in a work week. However, the FLSA provides an exception for certain employers in the health care industry, who are instead permitted to adopt a fixed work period of 14 consecutive days and pay overtime for all hours worked: (a) over 8 hours in a single day, or (b) over 80 hours in a 14-day work period.

Under the 8 and 80 overtime system, for example, an employee who works a 12-hour shift would be entitled ...

Blogs
Clock 6 minute read

Establishing and maintaining effective systems to protect sensitive personal data and confidential business information from outside interference while also assuring that privacy interests are protected is among an organization’s highest priorities. Our security and privacy team at Epstein Becker & Green has written extensively about the guidance and best practices issued by federal and state regulatory and enforcement agencies. Execution, monitoring and continually updating these preventive practices define an organization’s first line of defense. But what happens in the event that an organization actually suffers a breach? Is there guidance that might be available, particularly to healthcare organizations, to deal with continuity and disaster planning (BC/DR) directed towards assuring resilience and recovery in the event of a potentially-disastrous cyberattack?

Blogs
Clock 4 minute read

On May 26, 2021, the Department of Justice (“DOJ”) announced a coordinated law enforcement action against 14 telehealth executives, physicians, marketers, and healthcare business owners for their alleged fraudulent COVID-19 related Medicare claims resulting in over $143 million in false billing.[1] This coordinated effort highlights the increased scrutiny telehealth providers are facing as rapid expansion efforts due to COVID-19 shape industry standards.

Since the outset of the COVID-19 pandemic, the DOJ has prioritized identifying and prosecuting COVID-19 ...

Blogs
Clock 4 minute read

Cyber threats and cybersecurity controls have evolved significantly over the past two decades since the HIPAA Security Rule were originally promulgated. During this same time, healthcare entities have increasingly become a prime target of hackers seeking to extort payment using ransomware, exfiltrate patient data to commit fraud, or disrupt operations in other nefarious ways.  Recognizing these challenges, some security professionals have sought further clarity on the HIPAA Security Rule that they deem to be “long in the tooth”. Yet, regulators have not made any ...

Blogs
Clock less than a minute

Our colleague Melissa L. Jampol of Epstein Becker Green has a new post on the Commercial Litigation Update blog that will be interest to our readers: “Opioids, Sober Homes and ‘Telefraud’: An Overview of the DOJ 2020 Healthcare Fraud Takedown.”

The following is an excerpt:

As we have previously reported, opioids have been a large focus of DOJ in the past few years in an attempt to stem the opioid epidemic through increased enforcement and this takedown is a continuation of those efforts. DOJ stated that the charges involved in the opioid-related takedown involved the ...

Blogs
Clock 4 minute read

Ransomware basics

Ransomware is a serious form of cyber extortion that employs malware to prevent users from accessing their systems or data, either by locking the system or encrypting critical files until a ransom is paid. The hacker holds the key to unlock the system and usually demands payment in cryptocurrency.

Ransomware has been a known cyber threat vector for over a decade. In recent years, hackers have embraced increasingly sophisticated methods to exploit vulnerabilities and introduce ransomware into systems. They have also expanded the scope of impact by targeting ...

Blogs
Clock 2 minute read

Our colleagues Adam C. Abrahms and Christina C. Rentz, attorneys at Epstein Becker Green, have a post on the Management Memo blog that will be of interest to many of our readers in the health care industry: “NLRB Rings In the New Year by Signaling It Will Continue Its Pro-Union Rulings.”

Following is an excerpt:

In yet another decision that exhibits the current Board’s overreaching and expansive view of its jurisdiction, the Board recently ruled that nurses who supervise and assign other hospital staff are not statutory supervisors.

A Position Expressly Created to be ...

Blogs
Clock less than a minute

[caption id="attachment_2394" align="alignright" width="113"] Nathaniel M. Glasser[/caption]

In case you missed it, last week the U.S. Department of Labor (“DOL”) blogged about the misclassification of workers in the home care industry.  As a reminder, on October 1, 2013, the DOL issued its home care final rule, which (1) more narrowly defines the tasks that comprise exempt “companionship service” and (2) limits the exemptions for companionship services and live-in domestic service employees to individuals, families, or households using the service, and no longer ...

Blogs
Clock 6 minute read

On February 20, 2013, the Departments of Labor, Health and Human Services and the Treasury (the “Departments”) jointly issued a set of Frequently Asked Questions (“FAQs”) About Affordable Care Act Implementation (Part XII).  In the latest round of guidance, the Departments addressed the limitations on cost-sharing and the coverage of preventive services under the Patient Protection and Affordable Care Act, as amended by the Health Care and Education Reconciliation Act of 2010 (the “Affordable Care Act”).  This guidance applies only to non-grandfathered group ...

Blogs
Clock less than a minute

Epstein Becker Green is proud to announce that it has received the 2012 Chambers USA Award for Excellence in the Healthcare category. The results were announced at an awards dinner held on Thursday, June 7, 2012, in New York. Other firms nominated in the Healthcare category included Akin Gump Strauss Hauer & Feld LLP; Hogan Lovells US LLP; King & Spalding LLP; McDermott Will & Emery LLP; Ober Kaler Grimes & Shriver PC; and Proskauer Rose LLP.

The Chambers USA Awards for Excellence are based on research for the 2012 edition of Chambers USA: America's Leading Lawyers for Business and reflect ...

Blogs
Clock 4 minute read

by Pamela D. Tyner

Social media have become de rigueur globally.  Today, millions maintain connections with their friends, relatives and business acquaintances via Facebook, Twitter, LinkedIn, blogs and YouTube.  Recent studies indicate that social media popularity even predicts polling popularity and the stock market.  Translated to the healthcare arena, healthcare facilities and organizations are now trained to promote their business by communicating effectively via social media.  In addition, patients, physicians and employees of healthcare facilities and ...

Blogs
Clock less than a minute

Written By:  Ana S. Salper

Social media has revolutionized how we communicate with one another. From Facebook to Twitter, YouTube to blogs, social networking sites have permeated the workplace in ways that have significant implications for all employers.

Social media is both a source for marketing and promoting companies and products as well as an enterprise risk factor if not used appropriately or in a compliant way. In the health care industry, with the Health Insurance Portability and Accountability Act (“HIPAA”) and other privacy laws at stake, employers must have a ...

Blogs
Clock 3 minute read

by Pamela D. Tyner

Physicians and healthcare workers devote years to improving the quality of their patients’ lives.  Despite the Hippocratic code and compulsory non-retaliation policies, incidents of disruptive behavior from physicians and healthcare workers, though largely shielded from the general public, continue to frequently surface internally at healthcare environments.  Amidst recent jarring headlines of workplace violence and bullying, news media have discovered this same trend is also on the rise as healthcare facilities across the nation struggle to ...

Search This Blog

Blog Editors

Recent Updates

Related Services

Topics

Archives

Jump to Page

Subscribe

Sign up to receive an email notification when new Health Law Advisor posts are published:

Privacy Preference Center

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.