25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Sources for HHS OIG Fraud, Waste, and Abuse Guidelines
Mar11

Sources for HHS OIG Fraud, Waste, and Abuse Guidelines

The HHS OIG fraud, waste, and abuse guidelines are intended to support healthcare organizations in their efforts to self-monitor compliance with all applicable laws and program requirements. The guidelines can be found in many different sources, including guidance documents, advisory opinions, online training programs, and the HHS OIG YouTube channel. The healthcare industry is one of the most highly regulated industries in the U.S. Federal rules and regulations exist that govern patient safety (i.e., PSQIA), data security (i.e., HIPAA), and the physical environment (i.e., OSHA). In addition, each state has its own requirements for licensing healthcare organizations and healthcare practitioners. Failure to comply with these rules, regulations, and requirements can result in fines, facility closures, and/or loss of license. However, the most substantial penalties for non-compliance are often reserved for offenses against the federal government – particularly offenses that relate to fraud, waste, and abuse against a healthcare program operated by the Department of Health and Human...

Read More

CISA, NSA Release Cloud Security Guides

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have issued five cybersecurity information sheets to help organizations improve the security of their cloud environments. The guides include best practices for securing cloud environments along with recommended mitigations for improving cloud security. The cloud offers a cost-effective and flexible alternative to on-premises infrastructure and has become essential for supporting an increasingly remote workforce; however, cloud environments pose unique security challenges and each year many healthcare data breaches occur as a result of improperly secured cloud environments. Cyber threat actors are actively targeting cloud environments and are exploiting weak security configurations to gain access to sensitive data and after compromising cloud environments, often pivot to internal networks. Managed service providers (MSPs) are frequently targeted as if their environments can be breached, threat actors can abuse their high-privileged access to attack downstream clients, as was the...

Read More
HHS-OIG MA Organization Audit Suggests CMS Overpaid $3.7 Million Due to Submission of Incorrect Diagnosis Codes
Mar11

HHS-OIG MA Organization Audit Suggests CMS Overpaid $3.7 Million Due to Submission of Incorrect Diagnosis Codes

The Centers for Medicare and Medicaid Services (CMS) makes monthly payments to organizations under the Medicare Advantage (MA) program according to a risk adjustment system that depends on the health status of each enrollee. When MA organizations provide benefits to enrollees who have diagnoses that are associated with more intensive use of health care resources, they are paid more than when benefits are provided to enrollees with diagnoses that typically require fewer health care resources. The CMS bases the payments on the diagnosis codes that are collected by MA organizations from providers and are submitted to CMS. Some diagnoses are at a higher risk of miscoding, which could result in CMS overpaying MA organizations. To assess this, HHS-OIG conducted an audit of one MA organization – MediGold – to determine if the diagnosis codes submitted to CMS for use in the risk adjustment program complied with federal requirements. HHS-OIG found that most of the diagnosis codes submitted by MediGold to CMS did not comply with federal requirements and resulted in CMS overpaying MediGold by...

Read More
The Difference between Health Records and HIPAA Protected Health Information
Mar11

The Difference between Health Records and HIPAA Protected Health Information

The difference between health records and HIPAA Protected Health Information (PHI) is that, while many types of organizations can maintain health records about individuals, only organizations covered by HIPAA are required to protect health information to the standards required by the HIPAA Privacy and Security Rules. Not all health records are protected by HIPAA. For example, if you provide health information to an employer, a bank, or an auto insurance company, the health records maintained by these organizations are not protected by HIPAA. This is because these organizations do not qualify as HIPAA covered entities or business associates of HIPAA covered entities. This does not mean health records are not protected at all when they are maintained by “non-covered” organizations. Most states have enacted privacy laws that protect health records when they are not protected by HIPAA. In addition, most industries have standards that govern how sensitive personal information must be protected against unauthorized access. Why it May Be Important to Understand the Difference between...

Read More

NSA Publishes Guidance on Implementing Zero Trust to Limit Lateral Movement

The National Security Agency (NSA) has issued guidance on implementing zero trust security to limit lateral movement within the network should a threat actor breach the organization’s defenses. As we have seen many times in the past year, threat actors have gained initial access to a healthcare organization’s network and have been able to steal vast amounts of sensitive data and conduct crippling ransomware attacks. If those breached organizations had implemented a zero trust security architecture, the severity of those breaches could have been significantly reduced. The traditional IT security model is focused on preventing access to internal systems, with everyone inside the network perimeter trusted. A zero trust security architecture assumes that there is already a threat actor inside the network, and limits the actions that can be performed without further authentication. Zero trust is concerned with strengthening internal network controls to contain intrusions to a segmented portion of the network to limit the harm that can be caused. “Organizations need to operate with a...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist