Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Regulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks, Drew Simshaw, Nicolas Terry, Kris Hauser, M.L. Cummings Jan 2016

Regulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks, Drew Simshaw, Nicolas Terry, Kris Hauser, M.L. Cummings

Richmond Journal of Law & Technology

Some of the most dynamic areas of robotics research and development today are healthcare applications. Robot-assisted surgery, robotic nurses, in-home rehabilitation, and eldercare robots' are all demonstrating rapidly iterating innovation. Rising healthcare labor costs and an aging population will increase demand for these human surrogates and enhancements. However, like many emerging technologies, robots are difficult to place within existing regulatory frameworks. For example, the federal Food, Drug, and Cosmetic Act (FD&C Act) seeks to ensure that medical devices (few of which are consumer devices) are safe, the HIPAA Privacy and Security Rules apply to data collected by health care providers …


Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer Jan 2016

Digital Direction For The Analog Attorney-Date Protection, E-Discovery, And The Ethics Of Technological Competence In Today's World Of Tomorrow, Stacey Blaustein, Melinda L. Mclellan, James A. Sherer

Richmond Journal of Law & Technology

Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated by these resources are obvious, and have been for years. And because clients expect their counsel to take full advantage, savvy attorneys understand that they must keep up with ever-evolving legal technologies to stay competitive in a crowded marketplace.


Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey Jan 2015

Beyond Technophobia: Lawyers’ Ethical And Legal Obligations To Monitor Evolving Technology And Security Risks, Timothy J. Toohey

Richmond Journal of Law & Technology

Lawyers and technology have an uneasy relationship. Although some lawyers are early adapters, others take pride in ignoring technology because they believe it is alien to the practice of law. As Jody R. Westby observed, lawyers confronted with technology and security issues tend to have their “eyes glaze over” and “want to call in their ‘IT guy’ and go back to work.” But this technophobic attitude may no longer just be harmless conservatism. In the world of growing security risks, ignorance of technology may lead to violations of lawyers’ fundamental ethical duties of competence and confidentiality.


Silence Is Golden...Except In Health Care Philanthropy, Stacey A. Tovino May 2014

Silence Is Golden...Except In Health Care Philanthropy, Stacey A. Tovino

University of Richmond Law Review

No abstract provided.


The Compliance Case For Information Governance, Peter Sloan Jan 2014

The Compliance Case For Information Governance, Peter Sloan

Richmond Journal of Law & Technology

In an increasingly convoluted information environment, organizations strive to manage information-related risks and exposures, minimize information-related costs, and maximize information value. The inadequacy of traditional strategies for addressing information compliance, risk, and value is becoming clear, and so too is the need for a better, more holistic approach to governing the organization’s information.


The Reasonable Information Security Program, Peter Sloan Jan 2014

The Reasonable Information Security Program, Peter Sloan

Richmond Journal of Law & Technology

Our information inhabits a perilous world. Cyber theft, cyber extortion, mobile device loss, misappropriation of confidential business information, and unauthorized disclosures of protected information are real and present dangers for organizations of all sizes and across all industries.


Understanding And Contextualizing Precedents In E-Discovery: The Illusion Of Stare Decisis And Best Practices To Avoid Reliance On Outdated Guidance, Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander Jan 2014

Understanding And Contextualizing Precedents In E-Discovery: The Illusion Of Stare Decisis And Best Practices To Avoid Reliance On Outdated Guidance, Jonathan M. Redgrave, Keltie Hays Peay, Mathea K.E. Bulander

Richmond Journal of Law & Technology

But as precedents survive like the clavicle in the cat, long after the use they once served is at an end, and the reason for them has been forgotten, the result of following them must often be failure and confusion from the merely logical point of view.


An Expected Harm Approached To Compensating Consumers For Unauthorized Information Disclosures, Rachel Yoo Jan 2012

An Expected Harm Approached To Compensating Consumers For Unauthorized Information Disclosures, Rachel Yoo

Richmond Journal of Law & Technology

On May 22, 2007, the Executive Office of the President of the United States issued a memorandum concerned with safeguarding personal information, which first defined the term “personally identifiable information” as follows:

[I]nformation which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc.


Hipaa Compliance Resources, Paul M. Birch Dec 2011

Hipaa Compliance Resources, Paul M. Birch

Law Faculty Publications

As health care consumers, attorneys may need no introduction to the Health Insurance Portability and Accountability Act of 1996 (HIPAA). It may have introduced itself to you already in the form of a refused request for your spouse’s pharmacy receipts without signed authorization, or lengthier patient information forms to fill out before seeing a new doctor. On the other hand, the legislation may have facilitated your own access to your personal health records that otherwise would have been denied, or shielded those records from public disclosure by deterring a mass data spill. Along with establishing portability requirements for employee health …


Not So Hip?: The Expanded Burdens On And Consequences To Law Firms As Business Associates Under Hitech Modifications To Hipaa, Benjamin K. Hoover Apr 2010

Not So Hip?: The Expanded Burdens On And Consequences To Law Firms As Business Associates Under Hitech Modifications To Hipaa, Benjamin K. Hoover

Law Student Publications

The Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) governs the management of protected health information (“PHI”) by covered entities (e.g., health care providers) and their business associates. However, the Health Information Technology for Economic and Clinical Health Act (“HITECH”), contained within the American Recovery and Reinvestment Act of 2009, drastically alters the scope of HIPAA regulations with regard to business associates, including law firms that routinely handle the PHI governed by HIPAA. Under the HITECH Act, the definition of “business associate” is expanded, and these entities are treated as “covered” for purposes of the HIPAA security regulations; this …


Health Care Law, Kathleen M. Mccauley, Kristi L. Vanderlaan Nov 2009

Health Care Law, Kathleen M. Mccauley, Kristi L. Vanderlaan

University of Richmond Law Review

No abstract provided.


Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin Jan 2009

Corporate Privacy Trend: The “Value” Of Personally Identifiable Information (“Pii”) Equals The “Value” Of Financial Assets, John T. Soma, J. Zachary Courson, John Cadkin

Richmond Journal of Law & Technology

Corporate America’s increasing dependence on the electronic use of personally identifiable information (“PII”) necessitates a reexamination and expansion of the traditional conception of corporate assets. PII is now a commodity that companies trade and sell. As technological development increases, aspects of day-to-day business involving PII are performed electronically in a more cost effective and efficient manner. PII, which companies obtain at little cost, has quantifiable value that is rapidly reaching a level comparable to the value of traditional financial assets.


Health Care Law, Michael C. Guanzon Nov 2006

Health Care Law, Michael C. Guanzon

University of Richmond Law Review

No abstract provided.


Health Care Law, Kathleen M. Mccauley Nov 2003

Health Care Law, Kathleen M. Mccauley

University of Richmond Law Review

No abstract provided.


Health Care Law, Peter M. Mellette, Emily W. G. Towey, J. Vaden Hunt Nov 2002

Health Care Law, Peter M. Mellette, Emily W. G. Towey, J. Vaden Hunt

University of Richmond Law Review

No abstract provided.