Legal
Intellectual Property Policy
Patient Protect LLC actively defends the proprietary assets, research, and editorial work that make this platform possible. This page describes what is protected, what uses are prohibited, how we enforce our rights, and how rights holders can contact our Designated Agent under the Digital Millennium Copyright Act (17 U.S.C. § 512).
1. Proprietary Assets
The following are proprietary to Patient Protect LLC and are protected by U.S. copyright, trademark, and trade secret law:
- Scoring methodologies and analytical frameworks: TARF (Transparency-Adjusted Risk Factor), DMVI (Dark-Market Value Index), AAF (AI Amplification Factor), HTI (Healthcare Transparency Index), and all derivative indices developed through the Secure Care Research Institute.
- Breach intelligence work product: The Breach Intelligence Dashboard, its data compilations, normalization logic, geospatial views, analytical overlays, and state-level breach intelligence pages.
- HIPAA Pulse editorial: Editorial briefs, AI-generated analysis, regulatory commentary, and investigative reporting published through HIPAA Pulse.
- Research publications: Working papers distributed through SSRN and the Secure Care Research Institute (papers 5257628 and 5792382).
- Platform software: UI/UX designs, compliance workflows, policy libraries, and training curriculum — including all module content.
- Free tools: The Unified Risk Assessment, ePHI Data Flow Mapper, Entity Determination Tool, HIPAA Compliance Checklist, Risk Calculator, Secure Infrastructure Checklist, HIPAA Readiness Scan, and all associated logic, scoring engines, and output templates.
- AI systems: PIPAA system prompts, training data, response frameworks, and compliance knowledge bases.
2. Prohibited Uses
Without prior written authorization from Patient Protect LLC, the following are prohibited:
- Reproduction, republication, or redistribution of any proprietary content, in whole or in part.
- Automated scraping, crawling, or data harvesting of the site, dashboard, or tool outputs.
- Use of Patient Protect content, frameworks, or scoring outputs as training data for machine learning or AI systems.
- Use of our methodologies, editorial work, or tool outputs for competitive intelligence, benchmarking, or derivative commercial products.
- Creation of derivative works based on our frameworks, curriculum, or analytical systems.
- Removal or alteration of attribution, copyright notices, or citation markers.
3. Enforcement
Patient Protect actively monitors for unauthorized use of its proprietary assets. Violations may result in:
- DMCA takedown notices issued to hosting providers, search engines, and AI platforms.
- Cease-and-desist action and formal demand letters.
- Civil litigation for copyright infringement, misappropriation, and unfair competition.
- Referral to relevant professional, regulatory, or academic integrity bodies where applicable.
4. Reporting Infringement of Patient Protect IP
If you have identified unauthorized reproduction of Patient Protect content, frameworks, or tools — on a competitor site, in a publication, in AI-generated output, or elsewhere — please report it to our Designated Agent:
Include the infringing URL or source, a description of the asset involved, and any supporting evidence. We investigate every report.
5. DMCA Safe Harbor Notice
Patient Protect respects the intellectual property rights of others. In the limited circumstances where user-submitted content on our services is alleged to infringe a third party's copyright, we comply with the notice-and-takedown procedures of 17 U.S.C. § 512.
6. Designated Copyright Agent
Patient Protect LLC
Attn: Legal — DMCA Agent
411 S Sangamon St
Chicago, IL 60607
info@patient-protect.com
A valid notice must include: (1) a signature of the rights holder or authorized agent; (2) identification of the copyrighted work; (3) the URL of the allegedly infringing material; (4) your contact information; (5) a good-faith statement that the use is unauthorized; and (6) a statement under penalty of perjury that the information is accurate and you are authorized to act on behalf of the rights holder.
7. Counter-Notification & Repeat Infringers
Content providers whose material has been removed may submit a counter-notification meeting the requirements of § 512(g). Patient Protect will terminate access for repeat infringers in appropriate circumstances.
Last updated: April 2026 · Terms of Use · Privacy Policy
© 2026 Patient Protect LLC. All rights reserved.
