Our Broken System: Modifying the U.S. Pharmaceutical Regulatory Scheme to Decrease Surging Prescription Drug Prices

Source: International Business Times

By Dan Gutt

Download full note here.

The pharmaceutical industry’s societal purpose is to improve the health of the citizenry. However, the industry is beginning to fail that purpose by producing expensive prescription drugs, which are becoming inaccessible to the average person. Pharmaceutical prices began to spike in 2014, and there is no evidence that this trend will abate in the future. The causes of this phenomenon stem from several factors: expensive patented drugs, a reduction in the supply of generic drugs, and the pharmaceutical industries large marketing and sales expenditures. In summation, this is a complex problem that cannot be solved by a single solution, nor can it be solved by cost covering measures. Instead, innovative solutions that target the root causes of spiking pharmaceutical prices need to be applied. Examples of these solutions include governmental bulk-buying power, longer patent terms, referencing pricing for patented … Read the rest

Data Breaches: Is anyone responsible?

By: Robert Vickers

With seemingly increasing frequency, news reports reveal data breaches involving personal data stored on commercial data servers.  In some cases, the victims intentionally stored the data on the servers, while in others it was not the victims who stored the data, but a commercial entity, storing information about their customers.  Whether or not users or the company uploaded the data kept on company servers, who holds the responsibility for keeping the data safe?

One of the more recent newsworthy breaches involved cloud storage: the recent celebrity nude photo hack against Apple’s iCloud service[1] that has generated intense publicity[2].  Despite some early news reports alluding to yet another flaw in an online service, Apple claims that the blame for the inadvertent exposure of celebrity data does not lie on Apple[3].  Instead, hackers attacked individual accounts from which they could deduce user names, passwords, Read the rest