The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance
|
|
- Allan McKenzie
- 8 years ago
- Views:
Transcription
1 The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Ann Patterson Medical Identity Fraud Alliance
2 Medical Identity Theft Primer Includes theft of Protected Health Information (PHI) and/or Personally Identifiable Information (PII) for the purpose of financial gain or to unlawfully obtain medical goods or services Victims include the patient, healthcare providers, insurance companies, taxpayers and consumers who subsequently pay higher prices for their care Contributing factors Pervasiveness of electronic PHI Significant increase in the value of PHI because of its use by hackers and criminal organizations Increasing number of individuals with healthcare benefits Increasing alternative delivery models that include care outside of facilities Lack of coordinated response by public and private sectors to protect the privacy and security of PHI Changing legal and regulatory landscape as law keeps pace with technology, there will be additional regulations and increasing penalties for noncompliance 2
3 Some Facts Fraud adds $80 billion in excess costs to health care annually 1 $41.3 billion per annum estimated economic impact million medical records have been disclosed since in 4 chance of being a victim of identity fraud as a result of data breach 4 The average per record cost of a data breach for U.S. organizations is $188 6 Only 15% of insured adults familiar with medical identity theft 5 Growth in Electronic Health Records (EHR) and the new health insurance exchanges will magnify the problem Stolen, ransomed or misused patient data is at the core of many crimes perpetrated by the gamut of fraudsters, including organized crime National Academy of Sciences Health Care Study Javelin Strategy & Research Identity Fraud Report financial-pain-ensues-when-custodians-of-health- fail-to-be-good-stewards-of-privacy/ Harris Interactive/Nationwide Study: Few Aware of Risk of Medical Identity Theft Ponemon Institute Research Report: 2013 Cost of Data Breach Study Global Analysis 3
4 Survey on Medical Identity Theft The 2013 Survey on Medical Identity Theft, conducted by Ponemon Institute and sponsored by MIFA with support from ID Experts, measures the prevalence of medical identity theft in the United States and its impact on consumers Surveyed 788 adults (aged 18+), who self-reported they or close family members were victims of medical identity theft For purposes of the study, medical identity theft occurs when someone uses an individual s name and personal identity to fraudulently receive medical service, prescription drugs and goods, including attempts to commit fraudulent billing The survey was designed with input from: Federal Trade Commission Department of Justice Federal Bureau of Investigation 4
5 Survey Highlights Medical identity theft is growing base rate of victims has increased from.53% in 2010 to.82% in million estimated adult-aged victims of medical identity theft in ,000 estimated new victims in % increase in medical identity theft from 2012 to 2013 $12 billion out-of-pocket costs for victims Reputational risks for healthcare providers 5
6 Impact on Victims 64% did not incur any out-of-pocket costs 36% paid an average of $18,660 73% suffered other types of financial consequences; e.g., diminished credit score or financial ID theft Resolution of the crime is time-consuming 36% of respondents report it took a year or more to resolve the problems Misdiagnosis, mistreatment or delay in treatment 6
7 Lacking Awareness Individuals lack awareness of the seriousness of the crime 50% do not take any steps to protect themselves from medical identity theft 50% not aware medical identity theft can create inaccuracies in their permanent medical records 7
8 Education Needed 56% do not check their medical records for accuracy 51% don t know how 45% trust their providers to be accurate 38 did not think of it 30% records not easily accessible 21% don t care 54% do not review their EOBs 25% trust accuracy 18% do not understand 11% not important 8
9 Fraud May Be Preventable Sharing of personal identification for medical services is prevalent 58% shared their personal identification or medical credentials with someone they knew 30% knowingly shared 28% family member took identification or medical credentials without consent 9
10 Industry Costs 8200 out of every 1 million Americans will be a victim or, or complicit in, medical identity fraud 58% of cases involved sharing medical ID with an acquaintance (4760 out of 8200) $7,598 estimated average annual per capita cost for health care in the US (Kaiser Family Foundation)* The cost of health care to false identities is approximately $36M (4760 x $7,598) for every 1M insured individuals Medical identity fraud is generally not reported the actual costs may be higher * 10
11 Potential Consequences to Victims Financial ID theft Diminished credit score Lost time and productivity trying to fix inaccuracies in records Legal fees Employment related difficulties Revocation of licenses 11
12 Consequences of Medical ID Theft/Fraud 56% of victims lost trust/confidence in healthcare provider 15% Misdiagnosis 13% Mistreatment 11% Incorrect medication prescribed 14% Delay in receiving care 43% Paid out-of-pocket payments to health plan 39% Loss of health insurance 7% Increase in insurance premiums 12
13 What MIFA is Doing Mobilizing stakeholders patients, healthcare providers, insurers, service providers, regulators, legislators Building industry cooperation, consensus, and information sharing Conducting research Raising awareness and educating everyone in the ecosystem And Empowering individuals to protect their health information 13
14 For More Information Ann Patterson Senior Vice President and Program Director
The High Price of Medical Identity Theft and Fraud
The High Price of Medical Identity Theft and Fraud Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar
More informationThe Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA
The Growing Threat of Medical Identity Fraud: A Call to Action Presented by: Bill Barr, Development Coordinator, MIFA Agenda Review the challenge and cost of medical identity theft and resulting fraud
More information2013 Survey on Medical Identity Theft
2013 Survey on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from ID Experts Independently conducted by Ponemon Institute LLC Publication Date: September 2013 Ponemon
More informationThird Annual Survey on Medical Identity Theft
Third Annual Survey on Medical Identity Theft Sponsored by Experian s ProtectMyID Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report Part 1:
More informationHealthcare Utilizing Trusted Identity Credentials
Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171
More informationFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from: Kaiser Permanente, ID Experts, Experian Data Breach Resolution and Identity Finder, LLC
More informationForensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014
Forensic Accounting and Identity Theft Georgia HFMA Financial Executives Meeting December 12, 2014 The Federal Criminal definition of identity theft is when someone knowingly transfers, possesses, or uses,
More informationStopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
More informationFinding a Cure for Medical Identity Theft
Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY
More informationThe Growing Threat of Medical Identity Fraud: A Call to Action. A Publication of The Medical Identity Fraud Alliance July 2013
The Growing Threat of Medical Identity Fraud: A Call to Action A Publication of The Medical Identity Fraud Alliance July 2013 About the medical identity fraud alliance (MIFA) MIFA is the first public/private
More informationIdentity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section
Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationEVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes
EVERY TWO SECONDS The Financial Institution s Guide to Protecting Customers from Identity Crimes Don t lose your customers to identity crimes. Every 2 seconds, an identity fraud occurs in the United States.*
More informationSMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015
SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory
More informationConsumer Information Sheet 16 October 2013
First Aid For Medical Identity Theft Tips for Consumers Consumer Information Sheet 16 October 201 When another person uses your personal information to get medical services or goods, or to gain financially,
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationWhite Paper. Data Breach Mitigation in the Healthcare Industry
White Paper Data Breach Mitigation in the Healthcare Industry Thursday, October 08, 2015 Table of contents 1 Executive Summary 3 2 Personally Identifiable Information & Protected Health Information 4 2.1
More informationBest Practices for a Healthcare Data Breach: What You Don t Know Will Cost You
Best Practices for a Healthcare Data Breach: What You Don t Know Will Cost You By: Emilio Cividanes, Venable LLP Partner and Co-Chair Regulatory Practice Group Paul Luehr, Stroz Friedberg Managing Director
More informationCYBERCRIME AND THE HEALTHCARE INDUSTRY
CYBERCRIME AND THE HEALTHCARE INDUSTRY Executive Summary Healthcare professionals are in a tight spot. As administrative technologies like Electronic Health Records (EHRs) and patient and provider portals
More informationWhat is identity theft?
i den ti ty theft noun What is identity theft? the illegal use of someone else's personal identifying information (such as a Social Security number) in order to get money or credit Source: Merriam-Webster
More informationRESOLUTION SUBMITTED TO AMERICAN ASSOCIATION OF FAMILY AND CONSUMER SCIENCES
RESOLUTION SUBMITTED TO AMERICAN ASSOCIATION OF FAMILY AND CONSUMER SCIENCES IDENTITY THEFT WHEREAS, identity theft is a crime as a result of increased use of technology and the information age; and WHEREAS,
More informationStaying Safe after the Anthem Breach. Dartmouth College 3/25/15 ITS Security Team
Staying Safe after the Anthem Breach Dartmouth College 3/25/15 ITS Security Team Anthem Breach Reported on Feb 4, 2015 80 million records exposed Current and former members since 2004 Data exposed: o Names
More informationFederal Trade Commission Identity Theft Survey Report
Synovate Tel 703 790 9099 1650 Tysons Blvd Fax 703 790 9181 Suite 110 www.synovate.com McLean VA 22102 Identity Theft Survey Report Prepared for Prepared by Synovate September, 2003 Table of Contents Methodology...Page
More informationMedical Identity theft
Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission business.ftc.gov Although identity theft is usually associated with financial transactions, it also happens
More informationSafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)
SafeBiz Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) 1 About Us Since 2003 we have helped victims of identity theft recover fully from this devastating crime, and continue
More informationElectronic Health Information at Risk: A Study of IT Practitioners
Electronic Health Information at Risk: A Study of IT Practitioners Sponsored by LogLogic Conducted by Ponemon Institute LLC October 15, 2009 Ponemon Institute Research Report Executive summary Electronic
More informationCyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group
Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation
More informationIdentity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud
Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such
More informationAN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL
AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL Disclosure of Conflict of Interest This presenter has no significant financial interest/arrangement with any organization
More informationMARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
More informationMedical Identity theft
Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission business.ftc.gov Although identity theft is usually associated with financial transactions, it also happens
More informationHow the IRS Helps Taxpayers and Assist Victims
How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?
More informationCYBERCRIME AND THE HEALTHCARE INDUSTRY
CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic
More informationIdentity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
More informationIDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs
IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for
More informationWhite Paper #6. Privacy and Security
The Complexity of America s Health Care Industry White Paper #6 Privacy and Security www.nextwavehealthadvisors.com 2015 Next Wave Health Advisors and Lynn Harold Vogel, Ph.D. The Complexity of America
More informationIdentity Theft and Tax Administration
PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011
More informationCompromises in Healthcare Privacy due to Data Breaches
Compromises in Healthcare Privacy due to Data Breaches S. Srinivasan, PhD Distinguished Professor of Information Systems Jesse H. Jones School of Business Texas Southern University, Houston, Texas, USA
More informationFraud, Waste and Abuse Network Pharmacy Training 2011
Fraud, Waste and Abuse Network Pharmacy Training 2011 Table of Contents Centers for Medicare & Medicaid Services (CMS) Role Important Federal Statutes for Medicare Participants Fraud, Waste and Abuse Defined
More informationMedicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011
Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid
More informationArkansas Small Business Forum. IRS Identity Theft Prevention Efforts
Arkansas Small Business Forum IRS Identity Theft Prevention Efforts Contact Information Name: Gregory Metcalf Phone Number: 501-396-5912 Email Address: gregory.o.metcalf@irs.gov A persistent threat to
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationMedicare Advantage and Part D Fraud, Waste and Abuse Compliance Training
Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training Overview This Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training for first-tier, downstream and related entities
More informationIdentity Theft Trends
PERSONAL PRIVACY Identity Theft Trends Privacy TouchPoint Services GIS CONTEMPORARY IDENTITY THEFT TRENDS Powered by Victims of Identity Theft, 2012 Erika Harrell, Ph.D. and Lynn Langton, Ph.D., BJS Statisticians
More informationCOLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
More informationWhat every infosec professional should know about identity theft. Branko S. Bokan, CISSP Infosec4all.com
What every infosec professional should know about identity theft Branko S. Bokan, CISSP Infosec4all.com Background Based on a academic research The aim was to show flaws in statistics Discovered that there
More informationBILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)]
BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)] CBA Submission to the House of Commons Standing Committee on Justice and Human Rights April 7, 2008 Introduction The
More informationIdentity Theft. What it is and How to Protect Yourself
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft
More informationWhat Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act
What Health Care Entities Need to Know about HIPAA and the American Recovery and Reinvestment Act by Lane W. Staines and Cheri D. Green On February 17, 2009, The American Recovery and Reinvestment Act
More informationCombating Identity Theft: Tips to Reduce Your Cybersecurity Risks. September 16, 2015
Combating Identity Theft: Tips to Reduce Your Cybersecurity Risks September 16, 2015 Current Cyber Threat Cyber criminals are not only targeting businesses, but individuals Stolen personally identifiable
More informationWhen Your Child s Identity Is Stolen
When Your Child s Identity Is Stolen Consumer Information Sheet 3B May 2015 What Is Child Identity Theft? Adults are not the only targets of identity theft. In fact, children under the age of 18 can also
More informationHealthcare Industry Investments to Fight Medical Identity Fraud. A study by the Medical Identity Fraud Alliance
Healthcare Industry Investments to Fight Medical Identity Fraud A study by the Medical Identity Fraud Alliance September 2015 Table of Contents Executive Summary... 2 Analysis of Survey Results... 4 Strategic
More information5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically
More informationThe Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationAccess is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
More informationWorkspace-as-a-Service Defining Security and Mobility for Healthcare. vertiscale.com
Workspace-as-a-Service Defining Security and Mobility for Healthcare vertiscale.com Workspace-as-a-Service Defining Security and Mobility for Healthcare Introduction The healthcare industry continues to
More informationACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
More informationThe need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
More informationIRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012
IRS Payroll Topics Alan Gregerson March 15, 2012 VOH to Hires Act of 2011 Qualified Veteran WOTC 1 The New Voluntary Classification Settlement Program (VCSP) No Expiration VCSP Advantages The application
More informationFraud Waste and Abuse Training Requirement. To Whom It May Concern:
RE: Fraud Waste and Abuse Training Requirement To Whom It May Concern: This letter is to inform you about a new requirement being implemented by the CMS program (Centers for Medicare and Medicaid Services)
More informationManaging Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
More informationTax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft
207 Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft The US Dept of Justice defines identity theft as the use of another person s personal
More informationIdentity Theft Security and Compliance: Issues for Business
Identity Theft Security and Compliance: Issues for Business The Facts Six Common Uses for Stolen Information Financial Criminal Medical DMV Social Security Terrorist The Facts A Chronology of Data Breaches
More informationWho Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
More informationCyber Security Protecting critical health care information
OnTrend APRIL 2016 ISSUE Cyber Security Protecting critical health care information The trend Cyber Security As health care data security breaches proliferate, putting members data at risk for fraud or
More informationScope All [Name of Facility] operations
Scope All [Name of Facility] operations Purpose To describe the measures to be followed when health care is obtained under a fictitious name or in another person s name. This includes situations when a
More informationClick to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level
Click to edit Master title Fighting Back Against Click to edit Master text s Presented by Fifth Office levelof Privacy, Information Protection & Data Security Identity Theft and Online Fraud 1 Click Privacy
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationSecond Annual Benchmark Study on Patient Privacy & Data Security
Second Annual Benchmark Study on Patient Privacy & Data Security Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: December 2011 Ponemon Institute Research Report
More informationProcedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
More informationData Security in the Evolving Payments Ecosystem
Data Security in the Evolving Payments Ecosystem Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report
More informationSUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:
SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED
More informationFraud, Waste & Abuse. Training Course for UHCG Employees
Fraud, Waste & Abuse Training Course for UHCG Employees Overview The Centers for Medicare & Medicaid Services (CMS) require Medicare Advantage Organizations and Part D Plan Sponsors to provide annual fraud,
More information1 st Tier & Downstream Training Focus
Colorado Access Advantage (HMO) Medicare Advantage Part D Fraud, Waste and Abuse Compliance Training 2010 Introduction 2 The Centers for Medicare & Medicaid Services (CMS) requires annual fraud, waste
More informationTHE COST OF A DATA BREACH FOR HEALTHCARE ORGANIZATIONS
DATA SECURITY: THE COST OF A DATA BREACH FOR HEALTHCARE ORGANIZATIONS THE URGENCY OF IMPROVED SECURITY THE STORY OF A DATA BREACH S IMPACT SECURITY SUPPORT AND SERVICES SHARE THIS THE URGENCY OF IMPROVED
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationWRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationCriminal Code And Civil Liability Amendment Bill 2007
1 Criminal Code And Civil Liability Amendment Bill Explanatory Notes Objectives of the Bill The Bill seeks to: Amend section 328A of the Criminal Code to increase the maximum penalties for the offence
More informationThe World of Identity Theft from the IRS s Point of View
1 The World of Identity Theft from the IRS s Point of View Becky Chiaramida, Director IRS Office of Privacy, Governmental Liaison and Disclosure October 2, 2012 Identity theft: It is not a new problem
More informationAftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationBrief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft
Canadian Internet Policy and Public Interest Clinic Clinique d intérêt public et de politique d internet du Canada Brief to the House of Commons Standing Committee on Access to Information, Privacy and
More informationUnderstanding Health Insurance Portability Accountability Act AND HITECH. HIPAA s Privacy Rule
Understanding Health Insurance Portability Accountability Act AND HITECH HIPAA s Privacy Rule 1 What Is HIPAA s Privacy Rule The privacy rule is a component of the Health Insurance Portability and Accountability
More informationFirst Name MI Last. Street Address (P.O. Boxes cannot be accepted) City State Zip. First Name MI Last
Accident Claim Form Instructions for Filing a Claim LIFESECURE INSURANCE COMPANY ADMINISTRATIVE OFFICE ATTN: Claims Department PO Box 13490, Pensacola, FL 32591-3490 1-888-575-8246 Please have all sections
More informationStatement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the
Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005
More informationDATA BREACH: hy you should care!
DATA BREACH: hy you should care! Bob Gregg CEO Bob.gregg@idexpertscorp.com 1 Overview Defining the cyber security and Data breach problem The threat source- surprising Potential business impact No one
More informationBottomline Healthcare. Privacy and Data Security
Bottomline Healthcare Privacy and Data Security Start Page 2 Table of Contents 03 The Patient Privacy Challenge 05 Bottomline Healthcare Privacy and Data Security 07 How it Works Features Data Capture
More informationManaging Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
More informationCyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
More informationSCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection
SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How
More informationTax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Chad Cutting
Tax Refund Fraud and Identity Theft IRS Criminal Investigation Special Agent Chad Cutting Internal Revenue Service Criminal Investigation Criminal Investigation serves the American public by investigating
More informationHow child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
More informationIDENTITY THEFT AFFIDAVIT INSTRUCTIONS
IDENTITY THEFT AFFIDAVIT INSTRUCTIONS To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you did not create the debt to each of
More informationPCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
More informationPRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
More informationData Breaches, Identity Theft, and Employees
Data Breaches, Identity Theft, and Employees Joining the Dots and Dispelling the Myths What you ll learn Data Breaches + identity theft + employees Data Breaches or Data Donations? Data Breaches + Identity
More informationThe Rise in State Income Tax Refund Identity Fraud:
The Rise in State Income Tax Refund Identity Fraud: Overview It s fair to say that many people don t enjoy putting together the paperwork and filing their federal income taxes. The task is doubled for
More informationFalse or Exaggerated Bond Claims: What Can A Surety To Do Combat This Increasingly Prevalent Practice?
False or Exaggerated Bond Claims: What Can A Surety To Do Combat This Increasingly Prevalent Practice? By Diane C. Utz, Associate Watt, Tieder, Hoffar & Fitzgerald, L.L.P.* Most states have enacted regulatory
More informationHow the IRS Helps Taxpayers and Assists Victims
How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information
More information