This Web conference will highlight:
- Key Requirements of the 340B Drug Pricing Program
- Impact of Health Care Reform on 340B Drug Pricing Program Enforcement
- Covered Entity Recertification Requirements
- Audits of Covered Entities
- Contract Pharmacy Arrangements
- Ways to Ensure Compliance with 340B Drug Pricing Program Requirements
Space is limited so please RSVP to reserve your seat. For additional information, please contact Zulaikha Rahim at zrahim@foley.com.
CLE credits will be applied for in all applicable states. Foley & Lardner LLP certifies that this activity has been approved for California MCLE credits by the State Bar of California in the amount of 1hour General credits. Foley & Lardner LLP is a State Bar of California MCLE approved provider. Please note that participants must log in to both the teleconference and LiveMeeting portions on the date of the event; credit may not be obtained by viewing and/or listening to a program recording after the event.
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.