25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

California Extends Workplace Violence Prevention Requirements to Most Employers
Oct11

California Extends Workplace Violence Prevention Requirements to Most Employers

Employers in California must ensure they implement detailed Workplace Violence Prevention Plans following the passing of Senate Bill 553 by the California legislature, and the signing of the bill by Governor Gavin Newsom. The bill aims to improve protection for employees against workplace violence, which is a leading cause of death in the workplace. The Occupational Safety and Health Administration (OSHA) has yet to impose national standards for workplace violence, although OSHA has taken action against several hospitals and health systems that have failed to provide a safe working environment with controls to protect employees from violence in the workplace under existing standards in the OSH Act. States are permitted to introduce their own workplace violence standards. The California Division of Occupational Safety and Health (Cal/OSHA) has required hospitals to implement safety rules to protect employees from workplace violence since April 2017, and those requirements have now been extended to virtually all employers in the state. The new law includes exceptions, such as...

Read More

Zero-Day Vulnerability Exploited to Launch Record-Breaking DDoS Attacks

A zero-day vulnerability in the HTTP/2 protocol has been exploited to conduct distributed denial of service (DDoS) attacks at an unprecedented scale. Google mitigated one attack that peaked at 398 million requests per second (rps). The previous record saw 46 million rps at its peak. Record-breaking attacks have also been reported by other cloud giants, such as Amazon Web Services (AWS) and Cloudflare. HTTP/2 is used by all modern web servers and is critical to how the Internet works. HTTP/2 is used by around 60% of web applications and governs how users interact with websites. The HTTP/2 protocol allows multiple requests to be made quickly for different elements of content within the same connection, which is far more efficient than the HTTP/1.x approach, which establishes multiple parallel TCP connections to retrieve content from a server. The vulnerability – CVE-2023-44487 – has been dubbed HTTP/2 Rapid Reset and abuses a feature called stream cancellation to launch massive, high-volume DDoS attacks. In a standard HTTP/2 DDoS attack, an attacker opens up as many...

Read More
Who is Covered by OSHA?
Oct10

Who is Covered by OSHA?

OSHA covers most private sector businesses and their workforces in all fifty states, the District of Columbia, and other U.S. jurisdictions – either directly through Federal OSHA or through an OSHA-approved state plan. However, the situation relating to public sector employees is more complicated. In this article, we will discuss: Who is covered by OSHA in the private sector? Who is not covered by OSHA in the private sector? Special arrangements in the private sector Who is covered by OSHA in the public sector? Who is Covered by OSHA in the Private Sector? OSHA applies to all businesses in the private sector with at least one employee unless the business operates in an industry in which workplace safety and health is regulated by another federal agency such as the Mine Safety and Health Administration, the Department of Energy, or the Coast Guard. Although required to comply with OSHA’s hazard-specific standards, small businesses with fewer than ten employees and those operating in a low risk industry are partially exempt from OSHA compliance inasmuch as they are not required...

Read More

Marietta Area Health Care Settles Class Action Data Breach Lawsuit for $1.75 Million

Marietta Area Health Care, an Ohio-based not-for-profit health system that does business as Memorial Health System, has proposed a $1.75 million settlement to resolve a class action lawsuit that alleged it failed to protect patient health information, resulting in a cyberattack and data breach. Malware was detected within its network on August 14, 2021, and the investigation determined hackers had access to its IT systems between July 10, 2021, and Aug. 15, 2021, and it was confirmed in mid-September that patient data had potentially been viewed or acquired in the attack. The review of the affected files was completed on November 1, 2021, when it was confirmed that the HIPAA protected health information of more than 215,000 patients had been exposed, including names, addresses, Social Security numbers, medical/treatment information, and health insurance information. Affected patients were notified in January 2022 and were offered complimentary credit monitoring services. A lawsuit – Tucker v. Marietta Area Health Care d/b/a Memorial Health System – was filed in the U.S....

Read More

Top Ten Cybersecurity Misconfigurations and Recommended Mitigations

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have shared the top ten cybersecurity misconfigurations and the tactics, techniques, and procedures used by malicious actors to exploit these misconfigurations. Cyber threat actors search for and exploit unpatched vulnerabilities in software and operating systems to gain initial access to internal networks, but there are often much easier ways to breach defenses. Organizations of all sizes make mistakes that leave holes in their defenses that are easy to exploit, and poor cybersecurity practices can be exploited once initial access has been gained to move freely inside networks undetected. The NSA and CISA identified the top ten cybersecurity misconfigurations through their red and blue team assessments and incident response activities. These misconfigurations were found in organizations of all sizes, even large enterprises with mature cybersecurity postures. Default configurations of software and applications Improper separation of user/administrator privilege Insufficient internal...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist