Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the login-customizer domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131

Deprecated: Function WP_Dependencies->add_data() was called with an argument that is deprecated since version 6.9.0! IE conditional comments are ignored by all supported browsers. in /home1/natiopq9/public_html/wp-includes/functions.php on line 6131
The National Law Forum - Page 537 of 753 - Legal Updates. Legislative Analysis. Litigation News.

Proposal to Resuscitate Federal Highway Funding

COV_cmyk_C

House Republican leaders, Boehner, Cantor, and McCarthy have a proposal to address the Highway Trust Fund’s desperate funding problems and the reauthorization of MAP-21, which is set to expire on September 30, 2014.

As discussed in an earlier post, one of the biggest challenges facing Congress in the MAP-21 reauthorization process is what to do about the fiscal condition of the Highway Trust Fund (HTF) which supports funding of the federal highway and transit programs.  Simply stated, the HTF is on the verge of insolvency.  It has both a short term and long term problem.  In the short term, the HTF will not have sufficient revenue to pay the bills through September 30 and it will go into the red sometime in August.  In the long term, the HTF simply cannot support current highway and transit funding levels much less the higher levels that are needed to modernize the Nation’s national transportation network so that American businesses can compete in today’s highly-competitive global marketplace.

The House Republican Leaders’ proposal has three parts to it.  First, the proposal would transfer about $12 billion in general revenues into the Highway Trust Fund.  This would keep the HTF solvent until May 2015 at current funding levels.  Under current House Rules and under recent practice, a transfer of general funds into the Highway Trust Fund must be offset.  The Leaders’ memorandum suggests two potential offsets:  ending the delivery of some Saturday mail; and transferring the current balance remaining in the Leaking Underground Storage Tank Trust Fund.

Adoption of both suggestions would offset the $12 billion general fund transfer into the HTF and would allow MAP-21 to be extended until May 2015 at current funding levels.  It would solve the HTF’s short-term funding problem but it would not address the long-term issues.

Second, with MAP-21 expiring this September 30th, the memorandum contemplates a short-term extension, probably until May 2015, of MAP-21 programs rather than a multi-year reauthorization of the programs.  This short-term extension would be combined with the HTF short-term fix discussed above into one bill that Congress would consider over the next couple of months.  The goal would be to enact it before the August recess.

Third, consideration of the HTF’s long-term funding problems and MAP-21 reauthorization would be put off until 2015.  The rationale for this approach is that the serious work needed to achieve this structural reform has not been done yet.

This overall approach will undoubtedly disappoint many in the House and Senate who wanted to enact a long-term reauthorization bill this year.  There will also be considerable controversy over the postal reform offset.  But the bottom line is that something has to be done by the end of July or there will be a disruption of ongoing construction projects in August—right in the middle of the construction season and just months before congressional elections.

Article By:

Of:

The Affordable Care Act—Countdown to Compliance for Employers, Week 29: Wellness Programs, Smoking Cessation and e-Cigarettes

MintzLogo2010_Black

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) generally prohibits discrimination in eligibility, benefits, or premiums based on a health factor, except in the case of certain wellness programs. Final regulations issued in 2006 established rules implementing these nondiscrimination and wellness provisions. TheAffordable Care Act largely incorporates the provisions of the 2006 final regulations (with a few clarifications), and it changes the maximum reward that can be provided under a “health-contingent” wellness program from 20 percent to 30 percent. But in the case of smoking cessation programs, the maximum reward is increased to 50 percent. Comprehensive final regulations issued in June 2013 fleshed out the particulars of the new wellness program regime.

Health-contingent wellness programs require an individual to satisfy a standard related to a health factor to obtain a reward. The final rules divide health-contingent wellness programs into the following two categories: activity-only programs, and outcome-based programs. As applied to smoking cessation, an “activity-only program” might require an individual to attend a class to obtain the reward. In contrast, an outcome-based program would require an individual to quit smoking, or least take steps to do so under complex rules governing alternative standards.

Nowhere do the final regulations address the role of electronic cigarettes (or “e-cigarettes”). Simply put, the issue is whether an e-cigarette user is a smoker or a nonsmoker? (According to Wikipedia, an electronic cigarette (e-cig or e-cigarette), “is a battery-powered vaporizer which simulates tobacco smoking by producing a vapor that resembles smoke. It generally uses a heating element known as an atomizer that vaporizes a liquid solution.”) But questions relating to e-cigarettes are starting to surface in the context of wellness program administration. Specifically:

  1. Is an individual who uses e-cigarettes a “smoker” for purposes of qualifying, or not qualifying, for a wellness program reward, and
  2. May a wellness program offer e-cigarettes as an alternative standard, i.e., one that if satisfied would qualify an individual as a non-smoker?

Is an individual who uses e-cigarettes a “smoker” for purposes of qualifying, or not qualifying, for a wellness program reward?

While the final rules don’t mention or otherwise refer to e-cigarettes, they do provide ample clues to support the proposition that smoking cessation involves tobacco use. Here is the opening paragraph of the preamble:

SUMMARY: This document contains final regulations, consistent with the Affordable Care Act, regarding nondiscriminatory wellness programs in group health coverage. Specifically, these final regulations increase the maximum permissible reward under a health-contingent wellness program offered in connection with a group health plan (and any related health insurance coverage) from 20 percent to 30 percent of the cost of coverage. The final regulations further increase the maximum permissible reward to 50 percent for wellness programs designed to prevent or reduce tobacco use. (Emphasis added.)

There is also a discussion in the preamble about alternative standards (79 Fed Reg. p. 33,164 (middle column)), which reads in relevant part:

The Departments continue to maintain that, with respect to tobacco cessation, ‘‘overcoming an addiction sometimes requires a cycle of failure and renewed effort,’’ as stated in the preamble to the proposed regulations. For plans with an initial outcome-based standard that an individual not use tobacco, a reasonable alternative standard in Year 1 may be to try an educational seminar. (Footnotes omitted.)

In addition, the final regulations’ Economic Impact and Paperwork Burden section is replete with references to tobacco use, as are the examples (see Treas. Reg. § 54.9802-1(f)(4)(vi), examples 6 and 7).

On the other hand, the definition of what constitutes a participatory wellness program refers simply to “smoking cessation” (Treas. Reg. § 54.9802-1(f)(1)(ii)(D)), and the definition of an outcome-based wellness program (Treas. Reg. § 54.9802-1(f)(1)(v)) simply refers to “not smoking.” In neither case is there any reference to tobacco.

The Affordable Care Act’s rules governing wellness programs are included in the Act’s insurance market reforms, which take the form of amendments to the Public Health Service Act that are also incorporated by reference in the Internal Revenue Code and the Employee Retirement Income Security Act (ERISA). By virtue of being included in ERISA, participants have a private right of action to enforce these rules. So an employer that wanted to treat the use of e-cigarettes as smoking in order to deny access to a wellness reward would likely confront arguments similar to those set out above in the event of a challenge.

May a wellness program offer e-cigarettes as an alternative standard, i.e., one that if satisfied would qualify an individual as a non-smoker?

This is perhaps a more difficult question. May an employer designate e-cigarette use as an alternative standard? Anecdotal evidence suggests that employers are not doing so, at least not yet. But could they do so? And would it make a difference whether the e-cigarette in question used a nicotine-based solution as opposed to some other chemical? (According to Wikipedia, “solutions usually contain a mixture of propylene glycol, vegetable glycerin, nicotine, and flavorings, while others release a flavored vapor without nicotine.”) The answer in each case is, it’s too soon to tell.

The benefits and risks of electronic cigarette use are uncertain, with evidence going both ways. Better evidence would certainly give the regulators the basis for further rulemaking in the area. In the meantime, the final regulations’ multiple references to tobacco, and by implication, nicotine, seem to furnish as good a starting point as any. This approach would require a wellness plan sponsor to distinguish between nicotine-based and non-nicotine-based solutions, which may prove administratively burdensome.

The larger question, which may take some time to settle, is whether e-cigarettes advance or retard the cause of wellness. Absent reliable clinical evidence, regulators and wellness plan sponsors have little to guide their efforts or inform their decisions as to how to integrate e-cigarettes into responsible wellness plan designs. Complicating matters, the market for e-cigarettes is potentially large, which means that reliable (read: unbiased) clinical evidence may be hard to come by. For now, all plan sponsors can do is to answer the questions set out above in good faith and in accordance with their best understanding of the final regulations.

Article By:

Of:

 

The Right Way To Get Free Publicity

Great Legal Marketing

 

There’s a saying that goes “any publicity is good publicity,” and while I’m not so sure about that, I do know that positive publicity can do wonders for your law firm. But do you know what’s even better than positive publicity? FREE positive publicity.  That’s right, you can get great publicity that won’t cost you a single penny and I’m going to tell you how:

  • Contact your local TV news station.  Email, fax, or call your local news station and introduce yourself. Tell them who you are and what you do, and don’t forget to mention what you specialize in. Tell them that you are available if they ever need an expert to speak on a legal topic, especially in your niche.  Do this once a month until they contact you to be interviewed. If you do a good job, they’ll keep coming back to you and your face will continue to be broadcast on local television for free.
  • Notify different mediums of the media.  Once you’ve been interviewed on TV, let your local radio stations and newspapers know. They will see you as a leading expert in your field and they will follow you and want to ask you to interview with them.  This way, you can recycle interviews and information without being redundant.
  • Clip and recycle.  Once you have been interviewed on TV a few times, you’ll want to compile all of your interviews into one video that you can share online and use on you website to show potential clients that you are the leading expert in your field. With an easy editing software, you can clip the highlights of all your interviews and recycle them into one powerful, credibility-building video.
  • Testimonials.  If you host an event or seminar, bring a cameraman along with you.  After the event, have your cameraman politely ask attendees if he can interview them about their experience. If you’re a great lawyer, then I’ll bet you can host a great event, so you know that everyone who agrees to do an interview will do nothing but rave about you and the knowledge you possess. Take these testimonials and upload them to YouTube, your website, and social media so everyone can see how awesome you are.
  • Be educational.  The best way to show that you are a credible expert in your field is to prove it rather than just advertise it. In order to prove this, you need to be the source of information for all questions and topics in your field of law. So, you should blog, write articles, make videos, and even publish books on your wealth of information that you have about your practice area(s). When you hand someone a book that you authored instead of a flimsy advertisement with your face on it, you are creating great publicity and credibility for yourself and your firm.
Article By:

Of:

To Satisfy New Search Algorithms, Legal Websites Need Quality Content

The success of a law-firm website is determined by how many clients and potential clients visit the site, spend time there and take action based on what they discover.

Over the years, law-firm marketers focused on keyword and link strategies to enhance search engine results and increase traffic to their websites.  While these are still valuable tools, recent developments in the search universe have shifted the emphasis to content strategy.

Quality content includes well-written articles, blog posts, videos, webcasts, presentation slide decks, infographics, eBooks and white papers.  Quality content addresses client needs.

Sixty-seven percent of the time, online searchers use Google to find what they are looking for.  To provide the best results, Google is constantly tweaking its search algorithm. (An algorithm is a process or set of rules to be used by a computer in calculations or other problem-solving operations.)  These algorithms are designed to maintain search engine integrity and punish violators.

Sara Downey Robinson and Chris Davis discussed the changing landscape of digital marketing and search engine optimization at the monthly meeting of the Rocky Mountain Chapter of the Legal Marketing Association, held May 13 at Guard and Grace in LoDo Denver.

Davis is business development director at Burns Marketing, a full-service B2B marketing agency that combines traditional and digital marketing to help clients drive demand.   Robinson is marketing coordinator at Inflow, a top inbound-marketing firm specializing in search.

Panda, Penguin and Hummingbird

Panda and Penguin are two major changes to the existing Google algorithm made in 2011 and 2012, respectively.   In 2013, Google released a totally new algorithm called Hummingbird (which incorporates and enhances the updates made by Panda and Penguin).  These three developments have completely changed the way law firms must look at search.

“Law-firm sites that regularly showed up on page one now find themselves on page 20,” said Robinson.  “Since searchers rarely go beyond the second page of results in an online search, this is a real problem.”

Google Panda focuses on keywords.  Sites with keyword “stuffing” are demoted or flagged as spam.  Panda also penalizes low-quality content, thin content, duplicate content and the amount of advertising compared with the amount of useful content on a site.

Google Penguin focuses on links.  It focuses on “black hat” tactics like links that come from poor-quality sites, from sites that aren’t topically relevant to a target market, paid links, and links where the anchor text is overly optimized (exact-match anchor text).  Use natural language in your links, and vary it.

“Quality inbound links are not found at garage sales, “said Robinson.  “Steer clear of link farms.  A few high-quality, carefully developed links perform much better than a large number of weak, irrelevant links.  It takes time and perhaps a dedicated staff person to develop and nurture quality links.”

The new Google Hummingbird algorithm looks for a steady stream of high-quality, relevant content and natural language on webpages – and rewards those who provide it.  Hummingbird attempts to decipher a search engine query by using the context of a question rather than the specific keywords within the question.  Thin content, keyword stuffing and lack of relevant content will cause significant demotions.

“Content marketing is a technique that creates and distributes valuable, relevant and consistent content to attract and acquire a clearly defined audience,” said  Davis, “with the objective of driving profitable customer action.”

Identify client personas and clarify their needs

Before a law firm can create relevant content, it needs to know with whom it is communicating.  In marketing talk, this is called the “user persona” – or target market.

“In user-centered design and marketing, personas are user types that might use a legal service in a similar way,” said Davis.  “A small law firm might target one user persona.  A large law firm will target numerous user personas.”

One law-firm user persona might be high-income individuals going through divorce.  Another might be small businesses in need of venture capital.  Another might be large medical equipment manufacturers facing product liability lawsuits.  The more specific the persona, the more specific a law firm’s content can be.  Relevant content will answer the questions these users are asking, using natural language.

A user personal is a representation of the goals and behavior of a hypothesized group of users.  In most cases, personas are synthesized from data collected from user interviews.

“An effective law firm website will focus not on the firm’s capabilities, but on the identified needs of a persona or personas,” said Davis.  “It will use industry- or interest-specific terminology within a context familiar to the targeted persona.”

Create relevant content

Law firms that want to prevent or correct loss of search engine result page rankings and traffic should publish meaningful, original content on a regular basis.  The goal is content that will establish a firm, practice group or lawyer as a though leader in an area relevant to a user persona.

“Take the time to discover the common questions your clients have, and provide the answers to these questions,” said Davis.  “Relevant content can be written, but it also can and should be visual.  Video content posted on YouTube (which is owned by Google) is particularly powerful as ‘Google juice.’”

Instead of using keywords like “car accident,” use more specific terms like “car accident lawsuit” or “car accident insurance”, or better yet natural language terms like “What should I do if I am sued for a DUI car accident?” or “What should I look for when buying car insurance for an older vehicle?”  Think in terms of full-fledged questions that a person might ask Siri on a smartphone.

Once search brings users to a law firm’s site, there must be a way to create and nurture a relationship and convert the potential client into a real client over time.  Each item of posted content should contain a call to action – some way for the user to interact with the site so that the firm can capture data.  This could be a way to comment on a white paper or download information about an upcoming event.

Use analytics to measure success

“Take advantage of Google Analytics to collect data that can be used to improve the quality of your webpages – adding more of what works and eliminating what does not,” said Robinson.  “In Google Analytics, which is currently free, law firms can set up specific goals to study how users are entering and interacting with your website.”

Google Analytics lets a law firm know which content is most-viewed and acted upon, so that similar content can be added.  It lets the firm know which content is ignored, so that it can be eliminated or improves.  It lets a firm know the exact path users take through its site, so that adjustments can be made to create a better user experience.

If observation and analytics show that a law firm website is not getting the results it wants, an audit can help determine the source of the problem, take steps to fix the problem, measure the results of these steps, and look for any others areas that could be improved.

“Increasing inbound traffic to your website is not magic – it is a combination of art and science,” said Robinson.  “You should select any agency that makes you feel comfortable and uses language that is easy to understand.  You should never feel intimidated.

“At the same time, do not expect miracles,” said Robinson.  “Go into the process with reasonable expectations.   It takes time to make changes, add quality content and wait for the search engines to find and reward this content.  Each day, more than one million pieces of new content are posted to the Internet.  It takes time to rise above the fray.”

A law firm that has experienced worsening search engine results in the wake of Panda, Penguin and Hummingbird can take positive steps to restore performance.   Google will continue to reward webpages with strong content marketing efforts, including answer-driven content.  It also rewards sites that generate social media buzz – especially an active presence on its proprietary YouTube and Google+ platforms.

Article By:

Of:

Curbing Greenhouse Gas (GHG) Emissions – Good for the Environment, Bad for Investors?

Bracewell & Giuliani Logo

On June 2, 2014, EPA issued a proposed rule to control greenhouse gas emissions (GHGs) from the electric power generation sector of the United States. EPA’s goal is to obtain a reduction of GHG emissions in 2030 from this sector of 30% from the baseline year 2005. The 2005 baseline allows EPA to take credit for GHG emission reductions that have occurred since that time without any regulatory obligation. The proposal establishes GHG emission targets for each State (expect the District of Columbia and Vermont who do not have goals under the rule). Interim emission targets must be obtained in the 2020-2029 timeframe with final targets obtained by 2030.

The proposal does not suggest any particular emission limit on particular plants, but imposes the obligation on the States to derive a plan to achieve the reductions. The only penalty for noncompliance in the proposal is that EPA would impose an EPA-developed plan within the State if it fails to submit an approvable plan. While EPA has not dictated any particular approach a State may employ, the proposal favors a cap and trade or carbon tax system as the primary manner to obtain GHG emissions reductions.

So here are the two burning questions from the perspective of investors. First, will this rule actually survive in anywhere near this form?  Second, when will affected power projects need to start ramping up investment in order to comply with the rule, i.e., when should investors start to worry about financial capacity?

In terms of a “review for reality,” many industry experts suggest that it is nearly impossible to obtain the proposed 6% efficiency improvement at existing coal-fired power plants without major capital improvements, which could require complex Clean Air Act permitting under other provisions of the law. Other goals can only be achieved through substantial purchases of carbon credits (i.e., offsets) or the implementation of technologies that haven’t yet been proven to be commercially viable. (You’ve likely heard the aspirations to develop carbon capture and sequestration.) EPA also assumes that natural gas-fired power plants will be running at 70% capacity year-round, which may be difficult to achieve in practice. Finally, EPA assumes that energy efficiency improvements at the consumer level will be obtained at a rate of 1.5% every year until 2030 – an ambitious goal.

In terms of a “review for timing,” this is only the beginning of a very long process. After the usual rounds of public comment, EPA has targeted issuance of the final rule by June 1, 2015. Then the lawsuits will start. Then a new President with his/her own views will take office. Plus, even under the EPA’s own best case scenario, the proposed rule allows states until June 2016 to submit plans, with the potential for extension to June 2017. Once a state submits a plan, EPA must approve or disapprove it through notice and comment rulemaking. The proposal allows for EPA to complete the review of the plans within 12 months of the state plan submittal. If a state doesn’t submit a plan or EPA disapproves the plan, EPA must make a plan for the state. State plans must begin to meet an interim goal in 2020 and must achieve their final goal by 2030. Plus, State plans and EPA approval/disapproval present a separate source of litigation and associated delay.

So no need for panic dumping of carbon-intensive investments just yet, but keeping an eye on the process would be wise, including consideration of whether, if your industry investments are large enough, you should participate in, or form/join a group to participate in, the comment-making phase plus working with members of Congress. The earlier the involvement, the greater the opportunity to help shape the results.

Of:

The White House Big Data Report & Apple’s iOS 8: Shining the Light on an Alternative Approach to Privacy and Biomedical Research

DrinkerBiddle

Big data derives from “the growing technological ability to capture, aggregate, and process an ever-greater volume, velocity, and variety of data.”[i] Apple’s just-releasediOS 8 software development kit (“iOS 8 SDK”) highlights this growth.[ii] The iOS 8 SDK touts over 4,000 application programming interface calls including “greater extensibility” and “new frameworks.”iii For example, HomeKit and HealthKit, two of these new frameworks, serve as hubs for data generated by other applications and provide user interfaces to manage that data and related functionality.[iv] HealthKit’s APIs “provide the ability for health and fitness apps to communicate with each other … to provide a more comprehensive way to manage your health and fitness.”[v] HomeKit integrates home automation functions in a central location within the iOS device, allowing users to lock/unlock doors, turn on/off cameras, change or view thermostat settings, turn lights on/off, open garage doors and more – all from a single app.[vi] The iOS 8 SDK will inevitably lead to the development of countless apps and other technologies that “capture, aggregate, and process an ever-greater volume, velocity, and variety of data,” contributing immense volumes of data to the already-gargantuan big data ecosystem.

In the context of our health and wellbeing, big data – which includes, but is definitely not limited to, data generated by future iOS 8-related technologies – has boundless potential and can have a momentous impact on biomedical research, leading to new therapies and improved health outcomes. The big data reports recently issued by the White House and the President’s Council of Advisors on Science and Technology (“PCAST”) echo this fact. However, these reports also emphasize the challenges posed by applying the current approach to privacy to big data, including the focus on notice and consent.

After providing some background, this article examines the impact of big data on medical research. It then explores the privacy challenges posed by focusing on notice and consent with respect to big data. Finally, this article describes an alternative approach to privacy suggested by the big data reports and its application to biomedical research.

Background

On May 1, 2014, the White House released its report on big data, “Big Data: Seizing Opportunities, Preserving Values” (“WH Report”). The WH Report was supported by a separate effort and report produced by PCAST, “Big Data and Privacy: A Technological Perspective” (“PCAST Report”).[vii] The privacy implications of the eports on biomedical research – an area where big data can arguably have the greatest impact – are significant.

Notice and consent provide the foundation upon which privacy laws are built. Accordingly, it can be difficult to envision a situation where these conceptual underpinnings, while still important, begin to yield to a new approach. However, that is exactly what the reports suggest in the context of big data. As HealthKit and iOS 8 SDK demonstrate, we live in a world where health data is generated in numerous ways, both inside and outside of the traditional patient-doctor relationship. If given access to all this data, researchers can better analyze the effectiveness of existing therapies, develop new therapies faster, and more accurately predict and suggest measures to avoid the onset of disease, all leading to improved health outcomes. However, existing privacy laws often restrict researchers’ access to such data without first soliciting and obtaining proof of appropriate notice and consent.[viii] Focusing on individual notice and consent in some instances can be unnecessarily restrictive and can stall the discovery and development of new therapies. This is exacerbated by the fact that de-identification (or pseudonymization) – a process typically relied upon to alleviate some of these obstacles – is losing its effectiveness or would require stripping data of much meaningful value. Recognizing these flaws, the WH Report suggests a new approach where the focus is taken off of the collection of data and turned to the ways in which parties, including biomedical researchers, use data – an approach that allows researchers to maximize the possibilities of big data, while protecting individual privacy and ensuring that data is processed in a reasonable way.

The Benefits of Big Data to Biomedical Research

Before discussing why a new approach to privacy in the context of big data and biomedical research may be necessary, it is first important to understand the role of big data in research. As noted, the concept of big data encompasses “the growing technological ability to capture, aggregate, and process an ever-greater volume, velocity, and variety of data.”[ix] The word “growing” is essential here, as the sources of data contributing to the big data ecosystem are extensive and will continue to expand, especially as Internet-enabled devices such as those contemplated by HomeKit continue to develop.[x] These sources include not only the traditional doctor-patient relationship, but also consumer-generated and other non-traditional sources of health data such as those contemplated by HealthKit, including wearable technologies (e.g., Fitbit), patient-support sites (e.g., PatientsLikeMe.com), wellness programs, electronic/personal health records, etc. These sources expand even further when non-health data is combined with lifestyle and financial data.[xi]

The WH Report recognizes that these new abilities to collect and process information have the potential to bring about “unexpected … advancements in our quality of life.”[xii] The ability of researchers to analyze this vast amount of data can help “identify clinical treatments, prescription drugs, and public health interventions that may not appear to be effective in smaller samples, across broad populations, or using traditional research methods.”[xiii] In some instances, big data can in fact be the necessary component of a life-changing discovery.[xiv]

Further, the WH Report finds that big data holds the key to fully realizing the promise of predictive medicine, whereby doctors and researchers can fully analyze an individual’s health status and genetic information to better predict the onset of disease and/or how an individual might respond to specific therapies.[xv] These findings have the ability to affect not only particular patients but also family members and others with a similar genetic makeup.[xvi] It is worth noting that the WH Report highlights bio-banks and their role in “confronting important questions about personal privacy in the context of health research and treatment.”[xvii]

In summary, big data has a profound impact on biomedical research and, as a necessary result, on those that benefit from the fruits of researchers’ labor. The key to its realization is a privacy regime that can unlock for researchers vast amounts of different types of data obtained from diverse sources.

Problems With the Current Approach

Where the use of information is not directly regulated by the existing privacy framework, providing consumers with notice and choice regarding the processing of their personal information has become the de facto rule. Where the collection and use of information is specifically regulated (e.g., HIPAA, FCRA, etc.), notice and consent is required whenever information is used or shared in a way not permitted under the relevant statute. For example, under HIPAA, a doctor can disclose a patient’s personal health information for treatment purposes (permissible use) but would need to provide the patient with notice and obtain consent before disclosing the same information for marketing purposes (impermissible use). To avoid this obligation, entities seeking to share data in a way not described in the privacy notice and/or permitted under applicable law can de-identify the data, to purportedly make the data anonymous (for example, John Smith drives a white Honda and makes $55,000/year (identified) v. Person X drives a white Honda and makes $55,000/year (de-identified)).[xviii] Except under very limited circumstances (e.g., HIPAA limited data sets), the requirements regarding notice and consent apply equally to biomedical research as to more commercial uses.

In the context of big data, the first problem with notice and consent is that it places an enormous burden on the individual to manage all of the relevant privacy notices applicable to the processing of that individual’s data. In other words, it requires individuals to analyze each and every privacy notice applicable to them (which could be hundreds, if not more), determine whether those data collectors share information and with whom, and then attempt to track that information down as necessary. As the PCAST Report not-so-delicately states, “[i]n some fantasy world, users actually read these notices, understand their legal implications (consulting their attorneys if necessary), negotiate with other providers of similar services to get better privacy treatment, and only then click to indicate their consent. Reality is different.”[xix] This is aggravated by the fact that relevant privacy terms are often buried in privacy notices using legalese and provided on a take-it-or-leave-it basis.[xx] Although notice and consent may still play an important role where there is a direct connection between data collectors and individuals, it is evident why such a model loses its meaning when information is collected from a number of varied sources and those analyzing the data have no direct relationship with individuals.

Second, even where specific privacy regulations apply to the collection and use of personal information, such rules rarely consider or routinely allow for the disclosure of that information to researchers for biomedical research purposes, thus requiring researchers to independently provide notice and obtain consent. As the WH Report points out, “[t]he privacy frameworks that currently cover information now used in health may not be well suited to … facilitate the research that drives them.”[xxi] And as previously noted, often times biomedical researchers require non-health information, including lifestyle and financial data, if they want to maximize the benefits of big data. “These types of data are subjected to different and sometimes conflicting federal and state regulation,” if any regulation at all.[xxii]

Lastly, the ability to overcome de-identification is becoming easier due to “effective techniques … to pull the pieces back together through ‘re-identification’.”[xxiii] In fact, the very techniques used to analyze big data for legitimate purposes are the same advanced algorithms and technologies that allow re-identification of otherwise anonymous data.[xxiv] Moreover, “meaningful de-identification may strip the data of both its usefulness and the ability to ensure its provenance and accountability.”[xxv] In other words, de-identification is not as useful as it once was and further stripping data in an effort to overcome this fact could well extinguish any value the data may have (using the example above, car type and salary may still provide marketers with meaningful information (e.g., individuals with a similar salary may be interested in that car type), but the information “white Honda” alone is worthless). [xxvi]

The consequences of all this are either 1) biomedical researchers are deprived of valuable data or provided meaningless de-identified data, or 2) individuals have no idea that their information is being processed for research purposes. Both the benefits and obstacles relating to big data and biomedical research led to the WH Report’s recognition that we may need “to look closely at the notice and consent framework” because “focusing on controlling the collection and retention of personal data, while important, may no longer be sufficient to protect personal privacy.”xxvii] Further, as the PCAST Report points out, and as reflected in the WH Report, “notice and consent is defeated by exactly the positive benefits that big data enables: new, non-obvious, unexpectedly powerful uses of data.”xxviii So what does this new approach look like?

Alternative Approach to Big Data: Focus on Use, Not Collection[xxix]

The WH Report does not provide specific proposals. Rather, it suggests a framework for a new approach to big data that focuses on the type of use of such data and associated security controls, as opposed to whether notice was provided and consent obtained at the point of its collection. Re-focusing attention to the context and ways big data is used (including the ways in which results generated from big data analysis are used) could have many advantages for individuals and biomedical researchers. For example, as noted above, the notice and consent model places the burden on the individual to manage all of the relevant privacy notices applicable to the processing of that individual’s data and provides no backstop when those efforts fail or no attempt to manage notice provisions is made. Where the attention focuses on the context and uses of data, it shifts the burden of managing privacy expectations to the data collector and it holds entities that utilize big data (e.g., researchers) accountable for how data is used and any negative consequences it yields.[xxx]

The following are some specific considerations drawn from the reports regarding how a potential use framework might work:

  • Provide that all information used by researchers, regardless of the source, is subject to reasonable privacy protections similar to those prescribed under HIPAA.[xxxi] For example, any data relied upon by researchers can only be used and shared for biomedical research purposes.
  • Create special authorities or bodies to determine reasonable uses for big data utilized by researchers so as to realize the potential of big data while preserving individual privacy expectations.[xxxii] This would include recognizing and controlling harmful uses of data, including any actions that would lead to an adverse consequence to an individual.[xxxiii]
  • Develop a central research database for big data accessible to all biomedical researchers, with universal standards and architecture to facilitate controlled access to the data contained therein.[xxxiv]
  • Provide individuals with notice and choice whenever big data is used to make a decision regarding a particular individual.[xxxv]
  • Where individuals may not want certain data to enter the big data ecosystem, allow them to create standardized data use profiles that must be honored by data collectors. Such profiles could prohibit the data collector from sharing any information associated with such individuals or their devices.
  • Require reasonable security measures to protect data and any findings derived from big data, including encryption requirements.[xxxvi] 
  • Regulate inappropriate uses or disclosures of research information, and make parties liable for any adverse consequences of privacy violations.[xxxvii]

By offering these suggestions for public debate, the WH and PCAST reports have only initiated the discussion of a new approach to privacy, big data and biomedical research. Plainly, these proposals bring with them numerous questions and issues that must be answered and resolved before any transition can be contemplated (notably, what are appropriate uses and who determines this?).

Conclusion

Technologies utilizing the iOS 8 SDK, including HealthKit and HomeKit, illustrate the technological growth contributing to the big data environment. The WH and PCAST reports exemplify the endless possibilities that can be derived from this environment, as well as some of the important privacy issues affecting our ability to harness these possibilities. The reports constitute their authors’ consensus view that the existing approach to big data and biomedical research restricts the true potential big data can have on research, while providing individuals with little-to-no meaningful privacy protections. Whether the suggestions contained in the WH and PCAST reports will be – or should be – further developed is an open question that will undoubtedly lead to a healthy debate. Yet, in the case of the PCAST Report, the sheer diversity of players recognizing big data’s potential and associated privacy implications – including, but not limited to, leading representatives and academics from the Broad Institute of Harvard and MIT, UC-Berkeley, Microsoft, Google, National Academy of Engineering, University of Texas at Austin, University of Michigan, Princeton University, Zetta Venture Partners, National Quality Forum and others – provides hope that this potential will one day be realized – in a way that appropriately protects our privacy.[xxxviii]

WH Report Summary: click here.

PCAST Report Summary: click here.

Article By:

Of:

[i] WH Report, p. 2.

[ii] See Apple’s June 2, 2014, press release, Apple Releases iOS 8 SDK With Over 4,000 New APIs, last found at http://www.apple.com/pr/library/2014/06/02Apple-Releases-iOS-8-SDK-With-Over-4-000-New-APIs.html.

[iii] Id.

[iv] Id.

[v] Id.

[vi] Id.

[vii] The White House and PCAST issued summaries of their respective reports, including their policy recommendations, which can be easily found at the links following this article.

[viii] WH Report, p. 7.

[ix] WH Report, p. 2.

[x] WH Report, p. 5.

[xi] WH Report, p. 23.

[xii] WH Report, p. 3.

[xiii] WH Report, p. 23.

[xiv] WH Report, p. 6 (the WH Report includes two research-related examples of the impact of big data on research, including a study whereby the large number of data sets made “the critical difference in identifying the meaningful genetic variant for a disease.”).

[xv] WH Report, p. 23.

[xvi] WH Report, p. 23.

[xvii] WH Report, p. 23.

[xviii] In privacy law, “anonymous” data is often considered a subset of “de-identified” data. “Anonymized” data means the data has been de-identified and is incapable of being re-identified by anyone. “Pseudonymized” data, the other primary subset of “de-identified” data, replaces identifying data elements with a pseudonym (e.g., random id number), but can be re-identified by anyone holding the key. If the key was destroyed, “pseudonymized” data would become “anonymized” data.

[xix] PCAST Report, p. 38.

[xx] PCAST Report, p. 38.

[xxi] WH Report, p. 23.

[xxii] WH Report, p. 23.

[xxiii] WH Report, p. 8.

[xxiv] WH Report, p. 54; PCAST Report, pp. 38-39.

[xxv] WH Report, p. 8.

[xxvi] The PCAST Report does recognize that de-identification can be “useful as an added safeguard.” SePCAST Report, p. 39. Further, other leading regulators and academics consider de-identification a key part of protecting privacy, as it “drastically reduces the risk that personal information will be used or disclosed for unauthorized or malicious purposes.“ Dispelling the Myths Surrounding De-identification: Anonymization Remains a Strong Tool for Protecting Privacy, Ann Cavoukian, Ph.D. and Khaled El Emam, Ph.D. (2011), last found at http://www.ipc.on.ca/images/Resources/anonymization.pdf. Drs. Cavourkian and El Emam argue that “[w]hile it is clearly not foolproof, it remains a valuable and important mechanism in protecting personal data, and must not be abandoned.” Id.

[xxvii] WH Report, p. 54.

[xxviii] PCAST Report, p. 38; WH Report, p. 54.

[xxix] This approach is not one of the official policy recommendations contained in the WH Report. However, as discussed above, the WH Report discusses the impact of big data on biomedical research, as well as this new approach, extensively. Further, to the extent order has any meaning, the first recommendation made in the PCAST Report is that “[p]olicy attention should focus more on the actual uses of big data and less on its collection and analysis.” PCAST Report, pp. 49-50.

[xxx] WH Report, p. 56.

[xxxi] WH Report, p. 24.

[xxxii] WH Report, p. 23.

[xxxiii] PCAST Report, p. 44.

[xxxiv] WH Report, p. 24.

[xxxv] PCAST Report, pp. 48-49.

[xxxvi] PCAST Report, p. 49.

[xxxvii] PCAST Report, pp. 49-50.

[xxxviii] It must be noted that many leading regulators and academics have a different view on the importance and role of notice and consent, and argue that these principles in fact deserve more focus. Seee.g.The Unintended Consequences of Privacy Paternalism, Ann Cavoukian, Ph.D., Dr. Alexander Dix, LLM, and Khaled El Emam, Ph.D. (2014), last found at http://www.privacybydesign.ca/content/uploads/2014/03/pbd-privacy_paternalism.pdf.

Tax Tip: Free Federal Filing Program

Dickinson Wright Logo

Did you know that an individual may use free online tax preparation software and e-filing if he or she qualifies? This may be useful knowledge for your young adult children, even if you are not eligible.

The Free File Alliance is a nonprofit coalition of industry-leading tax software companies that have partnered with the IRS to help millions of Americans prepare and e-file their federal tax returns for free.

There are more than a dozen software options (brand-name software) available to assist a taxpayer with a 2013 adjusted gross income (“AGI”) of $58,000 or less at no cost. Choose your software carefully because some companies offer free state tax preparation and e-filing, whereas others do not.

Even though an individual’s gross income may be higher than $58,000, the individual may still qualify for this service because his or her gross income (e.g., salary, dividends, interest, alimony, and rental income) is reduced by various deductions, the most common being contributions to an IRA or qualified plan, to calculate the individual’s AGI.

70% of American taxpayers are eligible for this service and 98% of users would recommend this program to others.

If your AGI is higher than $58,000, free File Fillable Forms are available for federal returns only, including free e-filing. This service was recently extended to be available for use until October 2015. Go to www.irs.gov/freefile to begin.

Article By:

Of:

One week until the LMA P3 Conference, June 12-13 in Chicago

The National Law Review is pleased to bring you information about the LMA P3 Conference to be held in Chicago June 12-13, 2014.

LMA_P3_WB250x250_Frame2

 

When

Thursday – Friday, June 12-13, 2014

Where

Hyatt Chicago Magnificent Mile
633 N. Saint Clair St.
Chicago, IL 60611

Dig deeper into project management, pricing and process improvement.

The 2013 LMA P3 Conference set the bar high with fantastic breakout sessions, partner presentations and networking opportunities, but this year’s conference looks even more promising.

Join us for P3 – The Practice Innovation Conference, where pricing, project management, and practice innovation experts will discuss the use of various tactics to explore solutions to real issues face by law firms today.

This execution-focused conference will have attendees roll up their sleeves and collectively work out solutions. Click here to view the full conference schedule.

There is still time to register! Register now!

U.S. Supreme Court Makes It Easier To Avoid Method Patents Requiring Multiple Actors

Neal Gerber

On June 2, 2014, the United States Supreme Court unanimously held that a defendant was not liable for inducing infringement of a patented method where there is no direct infringement because the method steps are “divided” between the defendant and its customers. See Limelight Networks, Inc. v. Akamai Technologies, Inc., No. 12–786. The Court was reviewing a 6-5 en banc decision from the Court of Appeals for the Federal Circuit that held a party might be liable for inducing infringement under 35 USC 271(b) where a defendant carried out some steps and encouraged others (such as its customers) to carry out the remaining steps. In other words, the performance of the method steps was divided between a party and its customers, so the party could be liable for inducing the performance of the remaining steps it did not perform itself.  The Supreme Court reversed and remanded the judgment against Limelight, reasoning that there could be no liability for inducing infringement if no party directly infringed.

The Supreme Court relied on a prior decision by the Federal Circuit that there is no direct infringement of a method claim unless a single party performs every step of a claimed method or exercises “control or direction” over the entire process such that every step is attributable to that party. See Muniauction, Inc. v. Thomson Corp., 532 F.3d 1318, 1329 (Fed. Cir. 2013). Muniauction held that there was no direct infringement of a patented method when its distinct steps were performed by “mere arms-length cooperation” between parties. In Limelight, the Supreme Court “assumed” that Muniauction’s holding was correct but observed that the Federal Circuit could revisit it when the Limelight decision was remanded.

Both Limelight and Muniauction involved client-server scenarios for web-based businesses and cloud-based application services, but this decision has broad implications across a variety of fields, such as personalized or precision medicine.  For example, a patented method directed to diagnosing and treating a disease would not be infringed where a laboratory provides the diagnosis and the treating physician does not exercise “control or direction” over the steps performed by the laboratory.

Until Muniauction is further defined, the Court has returned the law to its state prior to the Federal Circuit’s Akamai holding, where liability turned on whether a single infringer exhibited sufficient “control or direction” over steps performed by others; if not, no one is liable for patent infringement.  For would-be infringers, this potentially provides a useful defense.  For patent applicants, it is a reminder to draft method claims in a manner such that all actions can be taken by a single entity.

Article By:

Of:

The National Law Review is Going Back to the Future. New website coming up soon!

The National Law Review is honoring its roots as one of the country’s first nation-wide legal journals by returning to a more journalistic style.   At the same time, we’re adding enhanced features to help our readers more quickly find the nation’s breaking legal news and analysis.

NLR-Transition-3-slide-7-16-14_256

Look for changes over the next few weeks.

Launch date soon!