25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

CISA Warns F5 BIG-IP Users About Abuse of Unencrypted Cookies
Oct15

CISA Warns F5 BIG-IP Users About Abuse of Unencrypted Cookies

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to F5 BIG-IP users that threat actors are abusing unencrypted persistence F5 BIG-IP cookies to map internal servers and identify potentially vulnerable devices on the network that can be attacked. F5 BIG-IP is a widely used suite of hardware and software solutions for managing and securing network traffic. One of the core modules is the Local Traffic Manager (LTM), which is used to manage traffic and spread it across different servers to optimize load-balanced server resources and ensure high availability. To maintain session consistency, the LTM module uses persistence cookies to ensure traffic from specific clients is delivered to the same server each time. According to CISA, threat actors have been observed leveraging the unencrypted persistence cookies that are managed by the LTM module during the planning stage of a cyberattack to enumerate other non-internet-facing devices on the network. The information gathered from the cookies, which can include IP addresses, port numbers, and load...

Read More
New York Implements New Cybersecurity Regulations For General Hospitals
Oct15

New York Implements New Cybersecurity Regulations For General Hospitals

On October 2, 2024, New York implemented new legislation that requires “general hospitals” in the state of New York to implement a raft of cybersecurity measures. Prior to the implementation of the new law, there were no state cybersecurity regulations for hospitals regarding the safeguarding of patients’ protected health information (PHI) and personally identifying information (PII), only the minimum standards of the federal Health Insurance Portability and Accountability Act (HIPAA). Under state law, general hospitals are classed as healthcare institutions that “provide medical or medical and surgical services primarily to in-patients by or under the supervision of a physician on a twenty-four-hour basis with provisions for admission or treatment of people in need of emergency care.” Currently, there are more than 190 general hospitals in the state of New York that are required to comply with the new cybersecurity requirements. The new law does not apply to diagnostic centers, treatment centers, outpatient care facilities, nursing homes, public health centers, or...

Read More
What is Personal Protective Equipment in Healthcare?
Oct15

What is Personal Protective Equipment in Healthcare?

Personal protective equipment in healthcare (PPE) is equipment worn to minimize exposure to occupational hazards that cannot be eliminated or mitigated by engineering and administrative controls. Healthcare organizations have legal and ethical obligations to ensure workforce members have access to the types of healthcare PPE necessary to perform their roles safely. Healthcare workers are exposed to a wide range of work-related safety and health hazards that can result in adverse outcomes such as injury, illness, disability, and death. To mitigate the risk of adverse outcomes, healthcare organizations are required by the OSHA General Duty Clause to identify and eliminate recognized hazards. When hazards cannot be eliminated, risks should be mitigated by implementing engineering and administrative controls. When it is not possible to isolate members of the workforce from recognized hazards (engineering controls) or change working practices to reduce the risk of adverse outcomes (administrative controls), healthcare organizations are required to provide appropriate personal protective...

Read More
Recent Examples of HIPAA Violations in Healthcare
Oct14

Recent Examples of HIPAA Violations in Healthcare

Reviewing recent examples of HIPAA violations in healthcare can help identify trends in non-compliance so that HIPAA covered entities and business associates can implement measures – or adjust workforce training – to mitigate the likelihood of previously unconsidered violation types occurring in their organizations. The HIPAA Security Rule (164.306(a)) requires HIPAA covered entities and business associates to protect ePHI against any “reasonably anticipated threats or hazards to the security and integrity of such information” and any “reasonably anticipated uses or disclosures of such information that are not permitted or required by [the Privacy Rule]”. The failure to comply with these implementation specifications are themselves examples of HIPAA violations in healthcare – even if no data breach or impermissible disclosure occurs. But who determines what threats or hazards and uses or disclosures can be “reasonably anticipated”? Sadly, there is no one-size-fits-all answer to this question. How to Comply with the “Reasonably Anticipated” Requirement In 2005,...

Read More

HIPAA Meaning of Protected Health Information

According to HHS’ Enforcement Highlights web page, the most common issue alleged in complaints to the Office for Civil Rights (OCR) is impermissible uses and disclosures of Protected Health Information. This is often interpreted as a failure to understand which uses and disclosures are permissible without patient authorizations; however, it could be just as likely there is a failure to understand the HIPAA meaning of Protected Health Information. One possible reason for misunderstanding the HIPAA meaning is that the term “Protected Health Information” does not appear in the original text of HIPAA. Furthermore, rather than appearing at the start of the Privacy Rule, the HIPAA meaning of Protected Health Information is defined at the start of the Administrative Simplification General Rules (§160.103). The definition – abridged for clarity – reads: “Protected Health Information means individually identifiable health information […] that is (i) Transmitted by electronic media; (ii) Maintained in electronic media; or (iii) Transmitted or maintained in any other form or...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist