25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

What is a HIPAA Violation?
Jan05

What is a HIPAA Violation?

A HIPAA violation is any failure to comply with the HIPAA regulations – which can include the unauthorized access, use, or disclosure of Protected Health Information (PHI), the failure to provide patients with access to their PHI, a lack of safeguards to protect PHI, the failure to conduct regular risk assessments, or insufficient workforce training on the HIPAA rules. To best answer the question what is a HIPAA violation, it is necessary to explain what HIPAA is, who it applies to, and what the definition of a HIPAA violation is; for although most people believe they know what a HIPAA compliance violation is, evidence suggests otherwise. You can also use the article in conjunction with our HIPAA Violations Checklist to understand what is required to ensure full compliance. Please use the form on this page to arrange your free copy of the checklist. Summary Of Article Contents Who Does It Apply To? What is a PHI Violation? Other Types of HIPAA Law Violation Further HIPAA Violation Examples How are HIPAA Violations Uncovered? What are the Penalties for Violations of HIPAA...

Read More
HIPAA Retention Requirements
Jan05

HIPAA Retention Requirements

The HIPAA retention requirements are that certain types of documents must be maintained for six years from the date of their creation or from the date on which they were last in effect, whichever is later. The reason why it is necessary to clarify which documents should be retained is to prevent confusion between the HIPAA retention requirements and state medical record retention requirements. This article aims to clarify what records should be retained under HIPAA compliance rules, and what other data retention requirements Covered Entities and Business Associates may have to consider. Throughout the Administrative Simplification Regulations of HIPAA, there are several references to HIPAA data retention. These generally fall into two categories – HIPAA medical records retention and HIPAA records retention requirements. The distinction between the two categories is that there are no HIPAA medical records retention requirements, but requirements exist for other documentation. One of the reasons the lack of HIPAA medical records retention requirements can be confusing is that,...

Read More
HIPAA Password Requirements
Jan05

HIPAA Password Requirements

The HIPAA password requirements are a combination of Administrative and Technical Safeguards designed to manage and monitor access to PHI. Covered entities and business associates can comply with the requirements by implementing Multi Factor Authentication (MFA) and password managers with logging capabilities. Understanding the HIPAA password requirements is not straightforward. HIPAA is intentionally technology-neutral; so whereas Security Standard §164.312(d) stipulates covered entities and business associates must “implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed”, there is no indication what procedures should be implemented or even that user verification should be password-based. Guidance published by the Department of Health and Human Services suggests there are three ways in which users can verify their identity: With something only known to the user, such as a password or PIN, With something the user possesses, such as a smart card or key, or With something unique to the user, such as a...

Read More
Is Texting in Violation of HIPAA?
Jan05

Is Texting in Violation of HIPAA?

There are many factors that determine whether a message sent via a text service is texting in violation of HIPAA. The factors include who the text is being sent by, the content of the message, the service the text is sent via, and the measures in place to prevent unauthorized access to the content of the message. It may also be the case that the recipient of the text has requested or authorized an otherwise impermissible disclosure. For many years, when a member of a healthcare provider’s workforce sent a text message to a patient containing Protected Health Information (PHI), it was assumed the workforce member was texting in violation of HIPAA because the most commonly used text service (at the time) was “Short Message Service” (SMS) texting which lacks the controls necessary to support compliance with the Administrative and Technical Safeguards of the HIPAA Security Rule. Although the assumption was incorrect (because a patient may have requested or authorized an otherwise impermissible disclosure), many sources still claim that texting is in violation of HIPAA – despite SMS...

Read More
What is Considered PHI Under HIPAA?
Jan05

What is Considered PHI Under HIPAA?

Under HIPAA PHI is considered to be an individual’s health, treatment, and payment information, and any related information maintained in the same designated record set that could identify the individual or be used with other information in the record set to identify the individual. This article aims to provide you with the full and correct definition of PHI. HIPAA rules and regulations are substantially about protecting PHI and we recommend you use our PHI Guide & Checklist to understand what is required for the protection of PHI. What Is Considered PHI Under HIPAA Rules? To best explain what is considered PHI under HIPAA compliance rules, it is necessary to review the definitions section of the Administrative Simplification Regulations (§160.103) starting with health information. Learn How To Safeguard Your Protected Health Information Order Our Free Protected Health Information Guide & Checklist(download link sent by email) Please enable JavaScript in your browser to complete this form.Business Email *Name *FirstLastNumber *Company Name *Send Me Free Guide Please enter...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist