Resources

Client Alerts, News Articles, Blog Posts, & Multimedia

Everything you need to know about BMD and the industry.

FTC Increases Targeting of Companies Lacking Cyber Protection

Client Alert

Here is how businesses can develop cyber strategies to mitigate breaches and financial risk.

The Federal Trade Commission (FTC) recently released a comprehensive cybersecurity report outlining key findings and recommendations based on emerging threats, trends in data breaches, and strategies for businesses to enhance their cybersecurity posture observed over the last year. The FTC strives to protect consumer privacy and respond to the evolving ways that companies use consumer data such as in the development of artificial intelligence models and misuse of health data. 

Importantly, the report emphasized the need for proactive measures to mitigate risks and highlighted the FTC’s initiative in targeting companies that fail to implement reasonable data security measures to protect consumer data. 

Here are some key strategies for businesses: 

  1. Risk Assessment and Management: Conduct regular risk assessments (at least annually) to identify potential vulnerabilities and prioritize them based on their potential impact on the business. Develop and implement a risk management plan to address these vulnerabilities effectively.
  2. Cyber Security Policies and Procedures:  Implement basic cybersecurity policies to protect its assets, data, and operations from cyber threats.
  3. Employee Training and Awareness: Educate employees about cybersecurity best practices, such as recognizing phishing emails, using strong passwords, and reporting suspicious activity. Regular training exercises help reinforce awareness.
  4. Access Control and Privilege Management: Implement strong access controls to limit user privileges and restrict access to sensitive data and systems. Use multi-factor authentication (MFA) where possible to add an extra layer of security.
  5. Data Encryption: Encrypt sensitive data to protect it from unauthorized access. 
  6. Patching: Keep software and systems up to date with the latest security patches to address known vulnerabilities. Establish a patch management process to ensure timely deployment of patches across the organization.
  7. Network Security: Deploy firewalls, intrusion detection/prevention systems, and other network security measures to monitor and protect against unauthorized access and malicious activity. Segment networks to limit the spread of potential breaches.
  8. Incident Response Plan: Develop a comprehensive incident response plan that outlines procedures for detecting, containing, and mitigating cybersecurity incidents. Test the plan regularly through tabletop exercises and simulations.
  9. Vendor Risk Management: Assess the security practices of third-party vendors and service providers to ensure they meet your organization's security standards. Include contractual clauses that outline security requirements and responsibilities.
  10. 10. Cyber Insurance: Consider obtaining cyber insurance to mitigate financial risks associated with cybersecurity incidents, such as data breaches or business interruptions.

By adopting a proactive approach to cybersecurity and implementing these strategies, businesses can enhance their cybersecurity posture and better protect themselves against evolving threats and complying with ever increasing legal obligations.  

BMD assists companies design and implement a strategy to achieve technical and organizational controls to bolster cybersecurity and data protection.  

If you have any questions regarding this topic and how to protect your company's data, please contact BMD Member Brandon Pauley at btpauley@bmdllc.com.


Corporate Transparency Act Update 3/14/24

On March 1, 2024, a federal district court in the Northern District of Alabama concluded that the Corporate Transparency Act (“CTA”) exceeded Congressional powers and enjoined the Department of the Treasury from enforcing the CTA against the plaintiffs. National Small Business United v. Yellen, No. 5:22-cv-01448 (N.D. Ala.). On March 11, 2024, the U.S. Department of Justice appealed the district court’s decision to the Eleventh Circuit Court of Appeals.

The Ohio State University Launches Its Accelerated Bachelor of Science in Nursing Program

In response to Ohio’s nursing shortage, The Ohio State University College of Nursing is accepting applications for its new Accelerated Bachelor of Science in Nursing program (aBSN). Created for students with a bachelor’s degree in non-nursing fields, the aBSN allows such students to obtain their nursing degree within 18 months. All aBSN students will participate in high-quality coursework and gain valuable clinical experience. Upon completion of the program, graduates will be eligible to take the State Board, National Council of Licensure Exam for Registered Nursing (NCLEX-RN).

Another Transparency Obligation: The FinCEN Beneficial Ownership Information Reporting Requirements

Many physician practices and healthcare businesses are facing a new set of federal transparency requirements that require action now. The U.S. Department of Treasury Financial Crimes Enforcement Network (“FinCEN”) Beneficial Ownership Information Reporting Requirements (the “Rule”), which was promulgated pursuant to the 2021 bipartisan Corporate Transparency Act, is intended to help curb illegal finance and other impermissible activity in the United States.

“In for a Penny, in for a Pound” is No Longer the Case for Florida Lawyers

On April 1, 2024, newly adopted Rule 1.041 to the Florida Rules of Civil Procedures goes into effect which creates a procedure for an attorney to appear in a limited manner in civil proceedings.  Currently, when a Florida attorney appears in a civil proceeding, he or she is reasonable for handling all aspects of the case for their client.  This new rule authorizes an attorney to file a notice limiting the attorney’s appearance to particular proceedings or specified matters prior to any appearance before the court.  For example, an attorney can now appear for the limited purpose of filing and arguing a motion to dismiss.  Once the motion to dismiss is heard by the court, the attorney may file a notice of termination of limited appearance and will have no further obligations in the case.

Enhancing Privacy Protections for Substance Use Disorder Patient Records

On February 8, 2024, the U.S. Department of Health and Human Services (“HHS”) finalized updated rules to 42 CFR Part 2 (“Part 2”) for the protection of Substance Use Disorder (“SUD”) patient records. The updated rules reflect the requirement that the Part 2 rules be more closely aligned with the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) privacy, breach notification, and enforcement rules as mandated by the Coronavirus Aid, Relief, and Economic Security Act of 2020.