PUBLICATIONS

Published by Lexington Books (2018)
Author: Jane Kim J.D.
Published: 2017-10-10
14:1 Ind. Health L. Rev. 129 (2017)
Despite the government’s aggressive efforts to combat fraud and abuse within the health industry and doing so successfully, it never seems sufficient enough. Flowing from those efforts to combat fraud and abuse, the Office of Inspector General (“OIG”) has pricked our consciousness with the Responsible Corporate Officer Doctrine (“RCOD”), whereby corporate officers are personally liable for the conduct of their companies.
Academic Articles
Author: Jane Kim
Journal of Public Health, Volume 39, Issue 3, September 2017, Pages 433–439.
Published: 02 September 2017
Today, the USA is struggling to balance access to healthcare for all its citizens with constraints of the federal budget and precepts of the US Constitution. This political struggle is nothing new. It became acute, however, when the Patient Protection and Affordable Care Act (PPACA), for short, the Affordable Care Act (ACA), or more commonly known as Obamacare, mandated ‘guaranteed issue’ laws whereby insurers are required to make health insurance plans of all kinds, whether individual, small or large group health plans, available to all Americans without exclusions based on preexisting conditions, age, etc. and without premium increases based on such risk factors.
Academic Articles
Authors: Jane Kim and David Zakson
Published: Spring, 2016
32 J. Marshall J. Info. Tech. & Privacy L. 133 (2016)
The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses that may be implemented. Lastly, Part E ex-amines compliance programs that are essential in detecting, preventing or, at least, minimizing security threats and hacks, further obviating individual responsibility of corporate officers for breaches.
Academic Articles
Author: Jane Kim
Published: Fall, 2015
32 J. Marshall J. Info. Tech. & Privacy L. 1 (2015)
To understand the laws of a foreign nation, one must first understand that nation’s culture. Its people and their customs will provide in-sight into the proper interpretation and application of such laws. For those reasons, this commentary commences with cursory background on Japanese people, followed by a brief comparative analysis of Health In-surance Portability and Accountability Act (“HIPAA”) (enacted in 1996) and its Japanese counterpart, the Act on the Protection of Personal In-formation (“APPI”) (enacted in 2003). The Japanese have borrowed a lot of American concepts of privacy laws. This paper will explore how these imported privacy concepts may not have translated well into Japanese culture and, in fact, a question is raised as to whether these privacy laws carry any meaning at all in Japan.
Academic Articles