25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

HHS-OIG Tells HHS to Improve Cloud Security Controls
Jul24

HHS-OIG Tells HHS to Improve Cloud Security Controls

An audit of the Department of Health and Human Services (HHS) Operating Divisions by the HHS Office of Inspector General (HHS-OIG) identified an incomplete inventory of cloud systems, incorrectly implemented cloud security controls, and system security officers who lacked the necessary skills to protect cloud information systems. HHS-OIG conducted an audit of the HHS Office of the Secretary (OS) cloud information system inventory and policies and procedures to determine whether the HHS and its operating divisions (OpDivs) had implemented effective cybersecurity controls for the cloud information systems owned, operated, or maintained by the HHS or its contractors in accordance with federal requirements. HHS OS had identified the components within the cloud systems that HHS-OIG was able to assess; however, through interviews with HHS OS IT personnel and cross-referencing the HHS OS-provided inventory list with its HHS Federal Information Security Modernization Act (FISMA) system list for FY 2022, HHS-OIG identified 13 cloud systems that were missing from the inventory. HHS OS...

Read More
Ransomware Attack on Australian eScripts Provider Affects 12.9 Million Australians
Jul24

Ransomware Attack on Australian eScripts Provider Affects 12.9 Million Australians

A ransomware attack on the Australian electronic prescription service provider MediSecure resulted in the theft of 6.5TB of data, including the sensitive data of up to 12.9 million Australians – around half of Australia’s population. That makes this the largest data breach in the country so far this year and one of the top 5 Australian data breaches of all time. The attack was identified on April 13, 2024; however, it has taken some time to determine the extent of the data breach. MediSecure said it was possible to reconstruct the affected server from a backup and all reasonable efforts have been made to identify the affected individuals and the data involved. That process has been incredibly time-consuming as the server contained an extremely large volume of semi-structured and unstructured data across a variety of different data sets. The data in the backup related to individuals who used MediSecure for prescription delivery between March 2019 and November 2023 and included names, contact information, Medicare and concession card information, and prescription information....

Read More
Pharmacy Association and 40 Providers Sue Change Healthcare Over Cyberattack
Jul24

Pharmacy Association and 40 Providers Sue Change Healthcare Over Cyberattack

The National Community Pharmacists Association (NCPA) and more than three dozen healthcare providers in 22 U.S. states are suing Change Healthcare, Optum, and UnitedHealth Group over its February 2024 ransomware attack and data breach. The Blackcat ransomware attack was discovered on February 21, 2024, when parts of Change Healthcare’s systems were encrypted. To contain the attack and prevent further unauthorized access, Change Healthcare took its systems offline, including the Change Healthcare platform that acts as a claims processing, revenue, and payment cycle management service that connects payers, providers, and patients. The platform and other offline Change Healthcare systems are relied upon by providers across the country and those systems touch the protected health information of 1 in 3 Americans. The platform remained offline for several weeks, and Change Healthcare still has not fully recovered from the attack. The HIPAA Journal has covered the Change Healthcare ransomware attack in detail here. This single point of failure left the healthcare industry immobilized and...

Read More
Michigan Medicine Suffers Another Email Data Breach
Jul23

Michigan Medicine Suffers Another Email Data Breach

University of Michigan Medicine (Michigan Medicine) has recently notified 56,953 individuals about the exposure of some of their protected health information. According to a recent news release, patient data was stored in three employee email accounts which were accessed by an unauthorized third party between May 23, and May 29, 2024. When suspicious email activity was detected, the affected accounts were immediately secured to prevent further unauthorized access by blocking the attacker’s IP address and changing account passwords. An investigation was launched to determine the nature and scope of the breach which confirmed that the incident was limited to three employee email accounts. Michigan Medicine conducted a review of the affected email accounts between June 10, 2024, and June 27, 2024, and confirmed that sensitive data was present in the accounts. The email accounts were used for communications related to payment and billing coordination. Michigan Medicine did not find any evidence to suggest the aim of the attack was to obtain patient information; however, data theft...

Read More
MCG Health Settles Class Action Data Breach Lawsuit for $8.8 Million
Jul23

MCG Health Settles Class Action Data Breach Lawsuit for $8.8 Million

The Seattle, WA-based software company, MCG Health, has proposed a $8.8 million settlement to resolve a consolidated class action lawsuit stemming from a February 2020 data breach that involved the protected health information of 793,283 individuals. It took MCG Health two years to discover that a threat actor had obtained data from its network, with that determination made on March 25, 2022. Patients of at least 10 of its clients had information compromised in the incident including names, Social Security numbers, medical codes, postal addresses, telephone numbers, email addresses, and dates of birth. Several class action lawsuits were filed in response to the breach that made similar claims and alleged negligence, invasion of privacy, bailment, breach of implied contract, breach of confidence, and a violation of the Washington Consumer Protection Act. The lawsuits were consolidated into a single action in the U.S. District Court for the Western District of Washington – In re: MCG Health Data Security Issue Litigation. MCG Health has not admitted any wrongdoing and chose to...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist