25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Multiple Security Vulnerabilities Identified at Arizona VA Healthcare System
Jul13

Multiple Security Vulnerabilities Identified at Arizona VA Healthcare System

A recent inspection of the Northern Arizona VA Healthcare System by the Department of Veterans Affairs Office of Inspector General (OIG) found deficiencies in all three security control areas that were investigated – configuration management, security management, and access controls. The Northern Arizona VA Healthcare System includes the Bob Stump Department of Veteran Affairs Medical Center in Prescott and 11 clinics in the state and serves approximately 33,000 veterans. The inspection was performed as the Northern Arizona VA Healthcare System had not previously been visited as part of a Federal Information Security Modernization Act of 2014 (FISMA) audit. The inspection revealed the Northern Arizona VA Healthcare System had deficiencies in four configuration management controls – vulnerability management, flaw remediation, unsupported components, and baseline configurations. While the VA has a vulnerability management program, the inspectors identified vulnerabilities that the Office of Information and Technology (OIT) had failed to identify, even though the same scanning tools...

Read More

Vulnerabilities Identified in Popular Telemedicine Software Development Kit

Security flaws have been identified in the QuickBlox software development kit (SDK) and application programming interface (API) that supports the real-time chat and video applications used by many telemedicine providers. The vulnerabilities were identified by security researchers from Claroty’s Team82 and Check Point Research who collaborated to look into the security of the popular QuickBlox SDK and API, which support applications used in telemedicine, finance, and smart IoT device applications. The SDK and API are provided to mobile and web application developers to deliver user management, real-time public and private chats, and incorporate security features to support HIPAA and GDPR compliance. The researchers identified two vulnerabilities that put sensitive data at risk, including protected health information (PHI). Given the extent to which the QuickBlox chat and video framework is used, the sensitive information of millions of individuals was at risk of exposure. CVE-2023-311847 is a high-severity flaw with a CVSS 3.1 base score of 7.8 and is due to the creation of...

Read More

Johns Hopkins Facing Multiple Lawsuits Over MOVEit Data Breach

Two lawsuits have recently been filed in the U.S. District Court for the District of Maryland against Johns Hopkins University and Johns Hopkins Health System that allege a failure to properly secure and safeguard the protected health information of patients, resulting in the theft of their data by the Clop ransomware group. In May 2023, the Clop ransomware group targeted a zero-day vulnerability in Progress Software’s MOVEit Transfer file transfer solution. The attacks occurred in late May and affected more than 150 organizations, resulting in the theft of the personal and protected health information of millions of individuals. Johns Hopkins has yet to confirm how many staff members, students, and patients were affected as the investigation into the incident has not yet concluded but has said names, addresses, dates of birth, and Social Security numbers were stolen in the attack. The two lawsuits make similar claims and allege a failure to implement appropriate security safeguards to protect personally identifiable information (PII) and protected health information (PHI).  One of...

Read More

Healthcare Providers and Vendors Confirm Recent PHI Disclosure Incidents

A round-up of data breaches that have recently been reported by HIPAA-covered entities. South Suburban Surgical Suites Reports Email Account Breach South Suburban Surgical Suites, a Munster, IN-based surgical center, has reported a breach of a legacy Microsoft Office 365-hosted business email account. The breach was detected on April 3, 2023, with the investigation confirming the account was accessed following a response to a phishing email. The response was on February 20, 2023, and the unauthorized access was blocked on April 3, 2023. The review of the email account was completed on June 5, 2023, and confirmed that the protected health information of 5,340 patients was stored in the account. That information varied from individual to individual and may have included full names in combination with addresses, dates of birth, Social Security numbers, driver’s license/state ID numbers, passport numbers, credit card information and/or financial account information, medical record numbers, dates of service, provider names, diagnoses/procedure information, prescriptions/medications,...

Read More
How Can You File a Report with OSHA?
Jul11

How Can You File a Report with OSHA?

You can file a report with OSHA by phone, fax, email, regular mail, via an online contact form, or by visiting an OSHA office in person. However, some channels of communication are not appropriate for some types of reports. These are the most common reasons for filing a report with OSHA: To report an emergency, severe injury, or fatality. To alert OSHA to unsafe working conditions. To report workplace safety and health violations. To file a complaint and request an inspection. Filing a whistleblower complaint following retaliation. To submit the annual summary OSHA Form 300A. How to File a Report with OSHA in an Emergency When reporting an emergency, severe injury, or fatality, OSHA recommends calling the 24-hour hotline at 1-800-321-6742. Alternatively, businesses can also call the nearest OSHA office if they are covered by a state plan. However, if a state office is closed, it is not permitted to leave a message to file a report with OSHA concerning an emergency, severe injury, or fatality. Severe injuries and fatalities in some states can also be reported via an online “Serious...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist