The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance

Size: px
Start display at page:

Download "The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance"

Transcription

1 The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Ann Patterson Medical Identity Fraud Alliance

2 Medical Identity Theft Primer Includes theft of Protected Health Information (PHI) and/or Personally Identifiable Information (PII) for the purpose of financial gain or to unlawfully obtain medical goods or services Victims include the patient, healthcare providers, insurance companies, taxpayers and consumers who subsequently pay higher prices for their care Contributing factors Pervasiveness of electronic PHI Significant increase in the value of PHI because of its use by hackers and criminal organizations Increasing number of individuals with healthcare benefits Increasing alternative delivery models that include care outside of facilities Lack of coordinated response by public and private sectors to protect the privacy and security of PHI Changing legal and regulatory landscape as law keeps pace with technology, there will be additional regulations and increasing penalties for noncompliance 2

3 Some Facts Fraud adds $80 billion in excess costs to health care annually 1 $41.3 billion per annum estimated economic impact million medical records have been disclosed since in 4 chance of being a victim of identity fraud as a result of data breach 4 The average per record cost of a data breach for U.S. organizations is $188 6 Only 15% of insured adults familiar with medical identity theft 5 Growth in Electronic Health Records (EHR) and the new health insurance exchanges will magnify the problem Stolen, ransomed or misused patient data is at the core of many crimes perpetrated by the gamut of fraudsters, including organized crime National Academy of Sciences Health Care Study Javelin Strategy & Research Identity Fraud Report financial-pain-ensues-when-custodians-of-health- fail-to-be-good-stewards-of-privacy/ Harris Interactive/Nationwide Study: Few Aware of Risk of Medical Identity Theft Ponemon Institute Research Report: 2013 Cost of Data Breach Study Global Analysis 3

4 Survey on Medical Identity Theft The 2013 Survey on Medical Identity Theft, conducted by Ponemon Institute and sponsored by MIFA with support from ID Experts, measures the prevalence of medical identity theft in the United States and its impact on consumers Surveyed 788 adults (aged 18+), who self-reported they or close family members were victims of medical identity theft For purposes of the study, medical identity theft occurs when someone uses an individual s name and personal identity to fraudulently receive medical service, prescription drugs and goods, including attempts to commit fraudulent billing The survey was designed with input from: Federal Trade Commission Department of Justice Federal Bureau of Investigation 4

5 Survey Highlights Medical identity theft is growing base rate of victims has increased from.53% in 2010 to.82% in million estimated adult-aged victims of medical identity theft in ,000 estimated new victims in % increase in medical identity theft from 2012 to 2013 $12 billion out-of-pocket costs for victims Reputational risks for healthcare providers 5

6 Impact on Victims 64% did not incur any out-of-pocket costs 36% paid an average of $18,660 73% suffered other types of financial consequences; e.g., diminished credit score or financial ID theft Resolution of the crime is time-consuming 36% of respondents report it took a year or more to resolve the problems Misdiagnosis, mistreatment or delay in treatment 6

7 Lacking Awareness Individuals lack awareness of the seriousness of the crime 50% do not take any steps to protect themselves from medical identity theft 50% not aware medical identity theft can create inaccuracies in their permanent medical records 7

8 Education Needed 56% do not check their medical records for accuracy 51% don t know how 45% trust their providers to be accurate 38 did not think of it 30% records not easily accessible 21% don t care 54% do not review their EOBs 25% trust accuracy 18% do not understand 11% not important 8

9 Fraud May Be Preventable Sharing of personal identification for medical services is prevalent 58% shared their personal identification or medical credentials with someone they knew 30% knowingly shared 28% family member took identification or medical credentials without consent 9

10 Industry Costs 8200 out of every 1 million Americans will be a victim or, or complicit in, medical identity fraud 58% of cases involved sharing medical ID with an acquaintance (4760 out of 8200) $7,598 estimated average annual per capita cost for health care in the US (Kaiser Family Foundation)* The cost of health care to false identities is approximately $36M (4760 x $7,598) for every 1M insured individuals Medical identity fraud is generally not reported the actual costs may be higher * 10

11 Potential Consequences to Victims Financial ID theft Diminished credit score Lost time and productivity trying to fix inaccuracies in records Legal fees Employment related difficulties Revocation of licenses 11

12 Consequences of Medical ID Theft/Fraud 56% of victims lost trust/confidence in healthcare provider 15% Misdiagnosis 13% Mistreatment 11% Incorrect medication prescribed 14% Delay in receiving care 43% Paid out-of-pocket payments to health plan 39% Loss of health insurance 7% Increase in insurance premiums 12

13 What MIFA is Doing Mobilizing stakeholders patients, healthcare providers, insurers, service providers, regulators, legislators Building industry cooperation, consensus, and information sharing Conducting research Raising awareness and educating everyone in the ecosystem And Empowering individuals to protect their health information 13

14 For More Information Ann Patterson Senior Vice President and Program Director

The High Price of Medical Identity Theft and Fraud

The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar

More information

The Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA

The Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA The Growing Threat of Medical Identity Fraud: A Call to Action Presented by: Bill Barr, Development Coordinator, MIFA Agenda Review the challenge and cost of medical identity theft and resulting fraud

More information

2013 Survey on Medical Identity Theft

2013 Survey on Medical Identity Theft 2013 Survey on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from ID Experts Independently conducted by Ponemon Institute LLC Publication Date: September 2013 Ponemon

More information

Third Annual Survey on Medical Identity Theft

Third Annual Survey on Medical Identity Theft Third Annual Survey on Medical Identity Theft Sponsored by Experian s ProtectMyID Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report Part 1:

More information

Healthcare Utilizing Trusted Identity Credentials

Healthcare Utilizing Trusted Identity Credentials Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171

More information

Fifth Annual Study on Medical Identity Theft

Fifth Annual Study on Medical Identity Theft Fifth Annual Study on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from: Kaiser Permanente, ID Experts, Experian Data Breach Resolution and Identity Finder, LLC

More information

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014 Forensic Accounting and Identity Theft Georgia HFMA Financial Executives Meeting December 12, 2014 The Federal Criminal definition of identity theft is when someone knowingly transfers, possesses, or uses,

More information

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

Finding a Cure for Medical Identity Theft

Finding a Cure for Medical Identity Theft Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY

More information

The Growing Threat of Medical Identity Fraud: A Call to Action. A Publication of The Medical Identity Fraud Alliance July 2013

The Growing Threat of Medical Identity Fraud: A Call to Action. A Publication of The Medical Identity Fraud Alliance July 2013 The Growing Threat of Medical Identity Fraud: A Call to Action A Publication of The Medical Identity Fraud Alliance July 2013 About the medical identity fraud alliance (MIFA) MIFA is the first public/private

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

EVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes

EVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes EVERY TWO SECONDS The Financial Institution s Guide to Protecting Customers from Identity Crimes Don t lose your customers to identity crimes. Every 2 seconds, an identity fraud occurs in the United States.*

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

Consumer Information Sheet 16 October 2013

Consumer Information Sheet 16 October 2013 First Aid For Medical Identity Theft Tips for Consumers Consumer Information Sheet 16 October 201 When another person uses your personal information to get medical services or goods, or to gain financially,

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

White Paper. Data Breach Mitigation in the Healthcare Industry

White Paper. Data Breach Mitigation in the Healthcare Industry White Paper Data Breach Mitigation in the Healthcare Industry Thursday, October 08, 2015 Table of contents 1 Executive Summary 3 2 Personally Identifiable Information & Protected Health Information 4 2.1

More information

Best Practices for a Healthcare Data Breach: What You Don t Know Will Cost You

Best Practices for a Healthcare Data Breach: What You Don t Know Will Cost You Best Practices for a Healthcare Data Breach: What You Don t Know Will Cost You By: Emilio Cividanes, Venable LLP Partner and Co-Chair Regulatory Practice Group Paul Luehr, Stroz Friedberg Managing Director

More information

CYBERCRIME AND THE HEALTHCARE INDUSTRY

CYBERCRIME AND THE HEALTHCARE INDUSTRY CYBERCRIME AND THE HEALTHCARE INDUSTRY Executive Summary Healthcare professionals are in a tight spot. As administrative technologies like Electronic Health Records (EHRs) and patient and provider portals

More information

What is identity theft?

What is identity theft? i den ti ty theft noun What is identity theft? the illegal use of someone else's personal identifying information (such as a Social Security number) in order to get money or credit Source: Merriam-Webster

More information

RESOLUTION SUBMITTED TO AMERICAN ASSOCIATION OF FAMILY AND CONSUMER SCIENCES

RESOLUTION SUBMITTED TO AMERICAN ASSOCIATION OF FAMILY AND CONSUMER SCIENCES RESOLUTION SUBMITTED TO AMERICAN ASSOCIATION OF FAMILY AND CONSUMER SCIENCES IDENTITY THEFT WHEREAS, identity theft is a crime as a result of increased use of technology and the information age; and WHEREAS,

More information

Staying Safe after the Anthem Breach. Dartmouth College 3/25/15 ITS Security Team

Staying Safe after the Anthem Breach. Dartmouth College 3/25/15 ITS Security Team Staying Safe after the Anthem Breach Dartmouth College 3/25/15 ITS Security Team Anthem Breach Reported on Feb 4, 2015 80 million records exposed Current and former members since 2004 Data exposed: o Names

More information

Federal Trade Commission Identity Theft Survey Report

Federal Trade Commission Identity Theft Survey Report Synovate Tel 703 790 9099 1650 Tysons Blvd Fax 703 790 9181 Suite 110 www.synovate.com McLean VA 22102 Identity Theft Survey Report Prepared for Prepared by Synovate September, 2003 Table of Contents Methodology...Page

More information

Medical Identity theft

Medical Identity theft Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission business.ftc.gov Although identity theft is usually associated with financial transactions, it also happens

More information

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) SafeBiz Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) 1 About Us Since 2003 we have helped victims of identity theft recover fully from this devastating crime, and continue

More information

Electronic Health Information at Risk: A Study of IT Practitioners

Electronic Health Information at Risk: A Study of IT Practitioners Electronic Health Information at Risk: A Study of IT Practitioners Sponsored by LogLogic Conducted by Ponemon Institute LLC October 15, 2009 Ponemon Institute Research Report Executive summary Electronic

More information

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL

AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL Disclosure of Conflict of Interest This presenter has no significant financial interest/arrangement with any organization

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

Medical Identity theft

Medical Identity theft Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission business.ftc.gov Although identity theft is usually associated with financial transactions, it also happens

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

CYBERCRIME AND THE HEALTHCARE INDUSTRY

CYBERCRIME AND THE HEALTHCARE INDUSTRY CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic

More information

Identity: The Key to the Future of Healthcare

Identity: The Key to the Future of Healthcare Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital

More information

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for

More information

White Paper #6. Privacy and Security

White Paper #6. Privacy and Security The Complexity of America s Health Care Industry White Paper #6 Privacy and Security www.nextwavehealthadvisors.com 2015 Next Wave Health Advisors and Lynn Harold Vogel, Ph.D. The Complexity of America

More information

Identity Theft and Tax Administration

Identity Theft and Tax Administration PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011

More information

Compromises in Healthcare Privacy due to Data Breaches

Compromises in Healthcare Privacy due to Data Breaches Compromises in Healthcare Privacy due to Data Breaches S. Srinivasan, PhD Distinguished Professor of Information Systems Jesse H. Jones School of Business Texas Southern University, Houston, Texas, USA

More information

Fraud, Waste and Abuse Network Pharmacy Training 2011

Fraud, Waste and Abuse Network Pharmacy Training 2011 Fraud, Waste and Abuse Network Pharmacy Training 2011 Table of Contents Centers for Medicare & Medicaid Services (CMS) Role Important Federal Statutes for Medicare Participants Fraud, Waste and Abuse Defined

More information

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid

More information

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts Arkansas Small Business Forum IRS Identity Theft Prevention Efforts Contact Information Name: Gregory Metcalf Phone Number: 501-396-5912 Email Address: gregory.o.metcalf@irs.gov A persistent threat to

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training

Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training Overview This Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training for first-tier, downstream and related entities

More information

Identity Theft Trends

Identity Theft Trends PERSONAL PRIVACY Identity Theft Trends Privacy TouchPoint Services GIS CONTEMPORARY IDENTITY THEFT TRENDS Powered by Victims of Identity Theft, 2012 Erika Harrell, Ph.D. and Lynn Langton, Ph.D., BJS Statisticians

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

What every infosec professional should know about identity theft. Branko S. Bokan, CISSP Infosec4all.com

What every infosec professional should know about identity theft. Branko S. Bokan, CISSP Infosec4all.com What every infosec professional should know about identity theft Branko S. Bokan, CISSP Infosec4all.com Background Based on a academic research The aim was to show flaws in statistics Discovered that there

More information

BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)]

BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)] BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)] CBA Submission to the House of Commons Standing Committee on Justice and Human Rights April 7, 2008 Introduction The

More information

Identity Theft. What it is and How to Protect Yourself

Identity Theft. What it is and How to Protect Yourself Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft

More information

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act

What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act by Lane W. Staines and Cheri D. Green On February 17, 2009, The American Recovery and Reinvestment Act

More information

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015

Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015 Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks September 16, 2015 Current Cyber Threat Cyber criminals are not only targeting businesses, but individuals Stolen personally identifiable

More information

When Your Child s Identity Is Stolen

When Your Child s Identity Is Stolen When Your Child s Identity Is Stolen Consumer Information Sheet 3B May 2015 What Is Child Identity Theft? Adults are not the only targets of identity theft. In fact, children under the age of 18 can also

More information

Healthcare Industry Investments to Fight Medical Identity Fraud. A study by the Medical Identity Fraud Alliance

Healthcare Industry Investments to Fight Medical Identity Fraud. A study by the Medical Identity Fraud Alliance Healthcare Industry Investments to Fight Medical Identity Fraud A study by the Medical Identity Fraud Alliance September 2015 Table of Contents Executive Summary... 2 Analysis of Survey Results... 4 Strategic

More information

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper 5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically

More information

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016 The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,

More information

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for

More information

Workspace-as-a-Service Defining Security and Mobility for Healthcare. vertiscale.com

Workspace-as-a-Service Defining Security and Mobility for Healthcare. vertiscale.com Workspace-as-a-Service Defining Security and Mobility for Healthcare vertiscale.com Workspace-as-a-Service Defining Security and Mobility for Healthcare Introduction The healthcare industry continues to

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

The need for companies to have a predetermined plan in place in the

The need for companies to have a predetermined plan in place in the Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security

More information

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012 IRS Payroll Topics Alan Gregerson March 15, 2012 VOH to Hires Act of 2011 Qualified Veteran WOTC 1 The New Voluntary Classification Settlement Program (VCSP) No Expiration VCSP Advantages The application

More information

Fraud Waste and Abuse Training Requirement. To Whom It May Concern:

Fraud Waste and Abuse Training Requirement. To Whom It May Concern: RE: Fraud Waste and Abuse Training Requirement To Whom It May Concern: This letter is to inform you about a new requirement being implemented by the CMS program (Centers for Medicare and Medicaid Services)

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft 207 Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft The US Dept of Justice defines identity theft as the use of another person s personal

More information

Identity Theft Security and Compliance: Issues for Business

Identity Theft Security and Compliance: Issues for Business Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches

More information

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5 Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose

More information

Cyber Security Protecting critical health care information

Cyber Security Protecting critical health care information OnTrend APRIL 2016 ISSUE Cyber Security Protecting critical health care information The trend Cyber Security As health care data security breaches proliferate, putting members data at risk for fraud or

More information

Scope All [Name of Facility] operations

Scope All [Name of Facility] operations Scope All [Name of Facility] operations Purpose To describe the measures to be followed when health care is obtained under a fictitious name or in another person s name. This includes situations when a

More information

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level Click to edit Master title Fighting Back Against Click to edit Master text s Presented by Fifth Office levelof Privacy, Information Protection & Data Security Identity Theft and Online Fraud 1 Click Privacy

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Second Annual Benchmark Study on Patient Privacy & Data Security

Second Annual Benchmark Study on Patient Privacy & Data Security Second Annual Benchmark Study on Patient Privacy & Data Security Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: December 2011 Ponemon Institute Research Report

More information

Procedure for Managing a Privacy Breach

Procedure for Managing a Privacy Breach Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access

More information

Data Security in the Evolving Payments Ecosystem

Data Security in the Evolving Payments Ecosystem Data Security in the Evolving Payments Ecosystem Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report

More information

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY: SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED

More information

Fraud, Waste & Abuse. Training Course for UHCG Employees

Fraud, Waste & Abuse. Training Course for UHCG Employees Fraud, Waste & Abuse Training Course for UHCG Employees Overview The Centers for Medicare & Medicaid Services (CMS) require Medicare Advantage Organizations and Part D Plan Sponsors to provide annual fraud,

More information

1 st Tier & Downstream Training Focus

1 st Tier & Downstream Training Focus Colorado Access Advantage (HMO) Medicare Advantage Part D Fraud, Waste and Abuse Compliance Training 2010 Introduction 2 The Centers for Medicare & Medicaid Services (CMS) requires annual fraud, waste

More information

THE COST OF A DATA BREACH FOR HEALTHCARE ORGANIZATIONS

THE COST OF A DATA BREACH FOR HEALTHCARE ORGANIZATIONS DATA SECURITY: THE COST OF A DATA BREACH FOR HEALTHCARE ORGANIZATIONS THE URGENCY OF IMPROVED SECURITY THE STORY OF A DATA BREACH S IMPACT SECURITY SUPPORT AND SERVICES SHARE THIS THE URGENCY OF IMPROVED

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

Criminal Code And Civil Liability Amendment Bill 2007

Criminal Code And Civil Liability Amendment Bill 2007 1 Criminal Code And Civil Liability Amendment Bill Explanatory Notes Objectives of the Bill The Bill seeks to: Amend section 328A of the Criminal Code to increase the maximum penalties for the offence

More information

The World of Identity Theft from the IRS s Point of View

The World of Identity Theft from the IRS s Point of View 1 The World of Identity Theft from the IRS s Point of View Becky Chiaramida, Director IRS Office of Privacy, Governmental Liaison and Disclosure October 2, 2012 Identity theft: It is not a new problem

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft Canadian Internet Policy and Public Interest Clinic Clinique d intérêt public et de politique d internet du Canada Brief to the House of Commons Standing Committee on Access to Information, Privacy and

More information

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule

Understanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule Understanding Health Insurance Portability Accountability Act AND HITECH HIPAA s Privacy Rule 1 What Is HIPAA s Privacy Rule The privacy rule is a component of the Health Insurance Portability and Accountability

More information

First Name MI Last. Street Address (P.O. Boxes cannot be accepted) City State Zip. First Name MI Last

First Name MI Last. Street Address (P.O. Boxes cannot be accepted) City State Zip. First Name MI Last Accident Claim Form Instructions for Filing a Claim LIFESECURE INSURANCE COMPANY ADMINISTRATIVE OFFICE ATTN: Claims Department PO Box 13490, Pensacola, FL 32591-3490 1-888-575-8246 Please have all sections

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

DATA BREACH: hy you should care!

DATA BREACH: hy you should care! DATA BREACH: hy you should care! Bob Gregg CEO Bob.gregg@idexpertscorp.com 1 Overview Defining the cyber security and Data breach problem The threat source- surprising Potential business impact No one

More information

Bottomline Healthcare. Privacy and Data Security

Bottomline Healthcare. Privacy and Data Security Bottomline Healthcare Privacy and Data Security Start Page 2 Table of Contents 03 The Patient Privacy Challenge 05 Bottomline Healthcare Privacy and Data Security 07 How it Works Features Data Capture

More information

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Chad Cutting

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Chad Cutting Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Chad Cutting Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

IDENTITY THEFT AFFIDAVIT INSTRUCTIONS

IDENTITY THEFT AFFIDAVIT INSTRUCTIONS IDENTITY THEFT AFFIDAVIT INSTRUCTIONS To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you did not create the debt to each of

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department

More information

Data Breaches, Identity Theft, and Employees

Data Breaches, Identity Theft, and Employees Data Breaches, Identity Theft, and Employees Joining the Dots and Dispelling the Myths What you ll learn Data Breaches + identity theft + employees Data Breaches or Data Donations? Data Breaches + Identity

More information

The Rise in State Income Tax Refund Identity Fraud:

The Rise in State Income Tax Refund Identity Fraud: The Rise in State Income Tax Refund Identity Fraud: Overview It s fair to say that many people don t enjoy putting together the paperwork and filing their federal income taxes. The task is doubled for

More information

False or Exaggerated Bond Claims: What Can A Surety To Do Combat This Increasingly Prevalent Practice?

False or Exaggerated Bond Claims: What Can A Surety To Do Combat This Increasingly Prevalent Practice? False or Exaggerated Bond Claims: What Can A Surety To Do Combat This Increasingly Prevalent Practice? By Diane C. Utz, Associate Watt, Tieder, Hoffar & Fitzgerald, L.L.P.* Most states have enacted regulatory

More information

How the IRS Helps Taxpayers and Assists Victims

How the IRS Helps Taxpayers and Assists Victims How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information

More information