by Bradley R. Coppedge, Esq. So, do you have a desire to gift or bequeath money to your favorite charitable organization, but are concerned that either (i) you will need the income generated by the property during your retirement or (ii) you will need the assets to from part of a bequest to your spouse or children.  Is this an irreconcilable dilemma? Good news!  There are several “tried and true” methods by which you can often accomplish both, through the use of a Charitable Remainder Trust (“CRT”) or Charitable Lead Trust (“CLT”); and to make it even more appealing, you will be entitled to an income or estate tax charitable deduction.  Further, with CRTs, you can often accomplish your retirement income goals better than you could without the CRT, while still providing a significant benefit to the charitable organizations of your choice. This summary will focus only on CRTs, and…       Read More

Compiled by: Richard Sheinis, Esq. Massive Intel Software Vulnerability is a Reminder to Always Protect Sensitive Data The Hill Security researchers uncovered a pair of significant vulnerabilities first thought to be limited to Intel processors. It was later revealed this also affect Intel’s peer chipmakers AMD and ARM. If unchecked the weaknesses could cause economy-wide disruption. Data exfiltrated from the combined number of … IoT Risks, Insider Threats, Password Hacks, Biometric Cracks: Cybersecurity in 2018 Looks Messy Healthcare IT News Organizations in 2018 increasingly will adopt standalone cyber insurance policies as boards and executives wake up to cyber liability, the report predicted. As boards and executives experience and witness the impact of cyberattacks, including reduced earnings, operational disruption, and claims … 36 Fake Security Apps in the Google Play Store Downloaded Malware, Stole Data, Tracked Locations TechRepublic Security firm Trend Micro recently discovered 36 apps in the Google Play Store with…       Read More

Hall Booth Smith, P.C. international business attorney John Parkerson led a Georgia delegation to Hungary from December 3-8 that promoted HBS’s international business expertise and its presence in the Central and Eastern European (“CEE”) region, and sought to foster ties between Georgian and Hungarian companies. Parkerson also is Honorary Consul General and Economic Counselor of Hungary for Georgia, Alabama and Tennessee. During the mission, Parkerson met approximately 25 Hungarian information communications technology (“ICT”) companies that want to explore partnerships and other opportunities in Georgia. As in Georgia, ICT is booming in Hungary. In addition, he met in Budapest with the Hungarian Chamber of Commerce and Industry, the AMCHAM-Hungary, and the Technology Association of Hungary. HBS sponsored a reception, attended by approximately 14 Hungarian ICT companies at which Parkerson welcomed guests and delivered a brief overview of HBS and how the firm can assist incoming foreign businesses. He gave a presentation…       Read More

Compiled by: Richard Sheinis, Esq. FTC Settles with Lenovo Over Ad Software Broadcasting & Cable The FTC has been deeded even more authority over computer privacy with the FCC’s vote to overturn the Title II classification of ISPs and return oversight of broadband privacy to the FTC. It does not have to stop pre-loading the software, but it cannot misrepresent any features of that software, must get … Emory Healthcare Reports Data Breach Involving 24K Patients, a Former Physician and a OneDrive … FierceHealthcare Emory Healthcare reports data breach involving 24K patients, a former physician and a OneDrive account. by Evan Sweeney |. Jan 2, 2018 11:06am. cybersecurity2. A former Emory Healthcare physician placed patient files on a OneDrive account accessible to other University of Arizona employees. Updated HHS Privacy Framework for Sharing Drug Abuse Treatment Data Breaks from HIPAA Tech2 The U.S. Department of Health and Human Services released its…       Read More

Written by: Kawania James, Esq. When an injured worker is not forthcoming about his condition, it could lead to an Employer/Insurer unnecessarily paying hundreds or thousands of dollars for a work injury that has resolved or an alleged disability that never existed. Often times Employers and Insurers will utilize investigative methods, such as surveillance and social media searches, to uncover the activity of an injured worker that he elects not to disclose. One investigative method that is gaining popularity in the world of litigation is the request for information stored in wearable fitness devices. The development and use of wearable technology (i.e. smart watches, smart glasses) and fitness/activity trackers (i.e., Fitbit, Garmin) is on the rise. These devices are designed, in part, to monitor and track fitness data such as steps taken, calories burned, sleep patterns, etc. Likewise, many people use apps such as the MyFitnessPal and Runkeeper app to…       Read More