The High Price of Medical Identity Theft and Fraud

Size: px
Start display at page:

Download "The High Price of Medical Identity Theft and Fraud"

Transcription

1 The High Price of Medical Identity Theft and Fraud

2 Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar with medical identity theft 3 The average per record cost of a data breach for U.S. organizations is $201 4 Healthcare sector $316 per record $70B improper CMS payments in Javelin Strategy & Research Identity Fraud Study Javelin Strategy & Research Identity Fraud Study Harris Interactive/Nationwide Study: Few Aware of Risk of Medical Identity Theft Cost of Data Breach Study (US), IBM/Ponemon 2

3 Medical Identity Theft & Fraud Theft of PHI for the purpose of financial gain or to unlawfully obtain medical goods or services Use of medical ID not your own, or fictitious/synthetic identity, to obtain goods and services, or to unlawfully financial gain Obtaining insurance, prescription drugs, healthcare treatment and medical goods, employment, government benefits or other financial gain May involve financial gain both from the sale of stolen PHI/PII or from the use of PHI/PII to obtain medical goods and services 3

4 Unique Medical ID Fraud Experience Corrupted medical records can be life-threating PHI is not easily closed or changed Financial liability not limited No healthcare equivalent of Fair Credit Reporting Act (FCRA) Costs borne by all parties no set practice 4

5 Survey on Medical ID Theft The 2014 Fifth Annual Study on Medical Identity Theft, sponsored by MIFA and our members, measures the prevalence of medical identity theft in the United States and its impact on consumers Surveyed 1,005 adults (aged 18+), who self-reported they or close family members were victims of medical identity theft For purposes of the study, medical identity theft occurs when someone uses an individual s name and personal identity to fraudulently receive medical service, prescription drugs and goods, including attempts to commit fraudulent billing 5

6 Survey Highlights Medical identity theft is growing Base rate of victims increased from.0053% in 2010 to.0102% in million adult-aged victims of medical identity theft in 2014 Nearly 500,000 estimated new victims in % increase in from 2013 to 2014 $20 billion estimated out-of-pocket costs for victims Reputational risks for healthcare providers & victims Resolution of the crime is time-consuming Medical identity theft can put victims lives at risk About half of medical identity theft may be preventable 6

7 Contributing Factors Pervasiveness of electronic PHI Increasing alternative delivery models that include care outside of facilities Increasing number of individuals with healthcare benefits High value of PHI on black market Emerging technologies cloud, mobile & BYOD, IoT Changing legal & regulatory landscape Criminals are highly organized industry is less organized Pay and chase model Lack of coordinated response by public & private sectors to specifically address PHI privacy & security 7

8 How It Happens Friends & Family crime Phished Data breach Insider/bad actor at healthcare provider or plan Lost wallet or other PHI-containing item PHI intercepted by crook , post mail 8

9 Discovering Medical ID Theft Collection letter Adverse entry on credit report Errors in invoices from healthcare provider EOB errors Mistakes in health records Informed by healthcare provider Data breach notification Law enforcement 9

10 Non-Medical Consequences 89% of those with negative reputational impacts expressed embarrassment from disclosure of sensitive medical information Employment related difficulties Revocation of professional licenses Lost time and productivity fixing inaccuracies in records Financial ID theft Out-of-pocket costs for resolution 10

11 Financial Impact 65% Of victims paid an average $13,453 out-of-pocket Reimbursements to healthcare provider for services to ID thief Payments to health plan Identity protection, credit reporting, legal counseling Diminished credit scores Increased health insurance premiums Legitimate health plan claims denied 11

12 Medical-related Consequences Misdiagnosis Mistreatment Incorrect medication prescribed Delay in receiving healthcare, treatment Lost health insurance coverage Lost trust/confidence in healthcare provider post-breach 12

13 Preventable Fraud Sharing of personal identification for medical services is prevalent 49% had their personal identification or medical credentials shared with someone they knew 25% willingly shared 24% family member or friend took identification or medical credentials without consent Consumers don t understand significant consequences from comingled health records 13

14 Education Needed 60% do not check their medical records for accuracy Don t know how Trust their providers to be accurate Did not think of it Records not easily accessible Don t care 50% do not review their EOBs at all Trust accuracy Do not understand or think the document is confusing Not important 14

15 Resolving the Crime Only 10% reach resolution Worked with health plan or healthcare provider to resolve Repaid healthcare provider or health insurer for services rendered to fraudster Obtained and reviewed credit reports Purchased identity protection services Contacted credit bureaus Engaged legal counsel Engaged non-profit that provides victim assistance 15

16 What Industry Can Do Stop usage of SSN as an identifier or as part of PHI; shift to other personal identifiers Take an eco-system stance Review of business associates security & privacy practices Enterprise-wide approach it s not just the CISO s responsibility Sound policies around cloud, mobile and BYOD, emerging technology Staff training insider threat is real Consumer education 16

17 Strength in Numbers to Reduce Medical ID Theft & Fraud Conduct research to understand the root causes of medical identity fraud, including internal and external sources. Participate in a community of industry knowledge experts to develop industry best practices, policies and best-in-class technologies for fraud detection and prevention Inform and influence public policy by building relationships with law enforcement and regulatory agencies (FBI, OIG, FTC, OCR), and advocating on behalf of consumers 17

18 Ann Patterson Medical Identity Fraud 18

The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance

The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Ann Patterson Medical Identity Fraud Alliance Medical Identity Theft Primer Includes theft of Protected

More information

The Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA

The Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA The Growing Threat of Medical Identity Fraud: A Call to Action Presented by: Bill Barr, Development Coordinator, MIFA Agenda Review the challenge and cost of medical identity theft and resulting fraud

More information

2013 Survey on Medical Identity Theft

2013 Survey on Medical Identity Theft 2013 Survey on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from ID Experts Independently conducted by Ponemon Institute LLC Publication Date: September 2013 Ponemon

More information

Third Annual Survey on Medical Identity Theft

Third Annual Survey on Medical Identity Theft Third Annual Survey on Medical Identity Theft Sponsored by Experian s ProtectMyID Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report Part 1:

More information

Fifth Annual Study on Medical Identity Theft

Fifth Annual Study on Medical Identity Theft Fifth Annual Study on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from: Kaiser Permanente, ID Experts, Experian Data Breach Resolution and Identity Finder, LLC

More information

Healthcare Utilizing Trusted Identity Credentials

Healthcare Utilizing Trusted Identity Credentials Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171

More information

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL

AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL Disclosure of Conflict of Interest This presenter has no significant financial interest/arrangement with any organization

More information

Medical Identity theft

Medical Identity theft Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission business.ftc.gov Although identity theft is usually associated with financial transactions, it also happens

More information

Medical Identity theft

Medical Identity theft Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission business.ftc.gov Although identity theft is usually associated with financial transactions, it also happens

More information

The Growing Threat of Medical Identity Fraud: A Call to Action. A Publication of The Medical Identity Fraud Alliance July 2013

The Growing Threat of Medical Identity Fraud: A Call to Action. A Publication of The Medical Identity Fraud Alliance July 2013 The Growing Threat of Medical Identity Fraud: A Call to Action A Publication of The Medical Identity Fraud Alliance July 2013 About the medical identity fraud alliance (MIFA) MIFA is the first public/private

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level Click to edit Master title Fighting Back Against Click to edit Master text s Presented by Fifth Office levelof Privacy, Information Protection & Data Security Identity Theft and Online Fraud 1 Click Privacy

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

Red Flag Policy and Procedures for Alexander Orthopaedic Associates

Red Flag Policy and Procedures for Alexander Orthopaedic Associates Red Flag Policy and Procedures for Alexander Orthopaedic Associates The Identify Theft Prevention Program developed by Alexander Medical Group LLC dba Alexander Orthopaedic Associates referred throughout

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

Integrity We are above reproach in everything we do.

Integrity We are above reproach in everything we do. Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above

More information

Scope All [Name of Facility] operations

Scope All [Name of Facility] operations Scope All [Name of Facility] operations Purpose To describe the measures to be followed when health care is obtained under a fictitious name or in another person s name. This includes situations when a

More information

The elderly are often specifically targeted for identity theft. Identity

The elderly are often specifically targeted for identity theft. Identity Identity Theft and the Elderly The elderly are often specifically targeted for identity theft. Identity theft and fraud against the elderly is a particularly insidious problem because in many instances,

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

NOTICE OF PRIVACY PRACTICES TEMPLATE. Sections highlighted in yellow are optional sections, depending on if applicable

NOTICE OF PRIVACY PRACTICES TEMPLATE. Sections highlighted in yellow are optional sections, depending on if applicable NOTICE OF PRIVACY PRACTICES TEMPLATE Sections highlighted in yellow are optional sections, depending on if applicable Original Date: ##/##/#### Revised per HIPAA Omnibus Rule ##/##/#### Revised Date Implementation:

More information

White Paper. Data Breach Mitigation in the Healthcare Industry

White Paper. Data Breach Mitigation in the Healthcare Industry White Paper Data Breach Mitigation in the Healthcare Industry Thursday, October 08, 2015 Table of contents 1 Executive Summary 3 2 Personally Identifiable Information & Protected Health Information 4 2.1

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) SafeBiz Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB) 1 About Us Since 2003 we have helped victims of identity theft recover fully from this devastating crime, and continue

More information

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of 2011. Qualified Veteran WOTC. March 15, 2012 IRS Payroll Topics Alan Gregerson March 15, 2012 VOH to Hires Act of 2011 Qualified Veteran WOTC 1 The New Voluntary Classification Settlement Program (VCSP) No Expiration VCSP Advantages The application

More information

NOTICE OF HEALTH INFORMATION PRACTICES

NOTICE OF HEALTH INFORMATION PRACTICES NOTICE OF HEALTH INFORMATION PRACTICES Effective Date: April 14, 2003 Date Amended: 9/5/13 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO

More information

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims Narina Bchtikian Stephen Connor Senior Stakeholder Liaison IRS Small Business/Self-Employed

More information

HIPAA Security Manual Administrative Security/Omnibus Rule

HIPAA Security Manual Administrative Security/Omnibus Rule Notice of Privacy Policies Form ***This notice describes how medical information about you may be used and disclosed and how you can get access to this information. PLEASE READ IT CAREFULLY!*** The tells

More information

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY: SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED

More information

Medicare Compliance and Fraud, Waste, and Abuse Training

Medicare Compliance and Fraud, Waste, and Abuse Training Medicare Compliance and Fraud, Waste, and Abuse Training Objectives Recognize laws and concepts affecting compliance and fraud, waste, and abuse (FWA) Increase awareness of FWA Use identification techniques

More information

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program A Case Study of Sam Houston State University s Red Flag Program Dr. Kristy L. Vienne Objective Participants will: Understand

More information

Identity Theft. What it is and How to Protect Yourself

Identity Theft. What it is and How to Protect Yourself Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft

More information

Weber Human Services Identity Theft Prevention Policy

Weber Human Services Identity Theft Prevention Policy Weber Human Services Identity Theft Prevention Policy Purpose: Weber Human Services (WHS) is committed to protecting the privacy of the Protected Health Information ( PHI ) of our clients and the Personal

More information

How the IRS Helps Taxpayers and Assists Victims

How the IRS Helps Taxpayers and Assists Victims How the IRS Helps Taxpayers and Assists Victims Combating Identity Theft and Online Fraud Justin McCarty January, 2014 What is identity theft? Identity theft occurs when someone uses your personal information

More information

The World of Identity Theft from the IRS s Point of View

The World of Identity Theft from the IRS s Point of View 1 The World of Identity Theft from the IRS s Point of View Becky Chiaramida, Director IRS Office of Privacy, Governmental Liaison and Disclosure October 2, 2012 Identity theft: It is not a new problem

More information

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN 55337 Ph: (952) 564-3030 Fax: (651) 925-0031

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN 55337 Ph: (952) 564-3030 Fax: (651) 925-0031 The Health Insurance Portability and Accountability Act (HIPAA) and Client Privacy Statement This notice describes how your medical information may be used and disclosed and how you can get access to this

More information

Finding a Cure for Medical Identity Theft

Finding a Cure for Medical Identity Theft Finding a Cure for Medical Identity Theft A look at the rise of medical identity theft and what small healthcare organizations are doing to address threats October 2014 www.csid.com TABLE OF CONTENTS SUMMARY

More information

March 22, 2013. Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206

March 22, 2013. Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206 March 22, 2013 March 22, 2013 Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206 InfoArmor is pleased to present the Tennessee State Employees Association (TSEA) with the following

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

Compromises in Healthcare Privacy due to Data Breaches

Compromises in Healthcare Privacy due to Data Breaches Compromises in Healthcare Privacy due to Data Breaches S. Srinivasan, PhD Distinguished Professor of Information Systems Jesse H. Jones School of Business Texas Southern University, Houston, Texas, USA

More information

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft 207 Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft The US Dept of Justice defines identity theft as the use of another person s personal

More information

PRIVACY AND IDENTITY THEFT 2003:

PRIVACY AND IDENTITY THEFT 2003: PRIVACY AND IDENTITY THEFT 2003: Where Are We Now And Where Are We Going.... Huggins v. CitiBank: A Case Study Stephen P. Groves, Sr., Esquire 205 King Street, Suite 400 Charleston, South Carolina 29401

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully. This Notice of

More information

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014 Forensic Accounting and Identity Theft Georgia HFMA Financial Executives Meeting December 12, 2014 The Federal Criminal definition of identity theft is when someone knowingly transfers, possesses, or uses,

More information

Prepared by Sgt. Gibbs, Thomas B. 82-11

Prepared by Sgt. Gibbs, Thomas B. 82-11 Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010 Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an

More information

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts Arkansas Small Business Forum IRS Identity Theft Prevention Efforts Contact Information Name: Gregory Metcalf Phone Number: 501-396-5912 Email Address: gregory.o.metcalf@irs.gov A persistent threat to

More information

Family Protection Plan

Family Protection Plan Providing Customizable Products & Services Family Protection Plan The Most Comprehensive Discount Legal Product Available Legal Care Identity Theft Solutions Free & Discounted Legal Care Legal Club of

More information

Federal and State Government Identity Theft and Protection Initiatives

Federal and State Government Identity Theft and Protection Initiatives Federal and State Government Identity Theft and Protection Initiatives Jill Runow May 1, 2012 Identity theft: It is not a new problem 2 The most misused SSN of all time Happened more than 70 years ago

More information

General Q&A Northland Pioneer Personal Data Security Incident

General Q&A Northland Pioneer Personal Data Security Incident General Q&A Northland Pioneer Personal Data Security Incident 1. What happened? On May 2, 2016, W-2 information for 2015 was forwarded to a fraudulent email address by a college employee. Current and former

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009 [FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]

More information

Federal Trade Commission Identity Theft Survey Report

Federal Trade Commission Identity Theft Survey Report Synovate Tel 703 790 9099 1650 Tysons Blvd Fax 703 790 9181 Suite 110 www.synovate.com McLean VA 22102 Identity Theft Survey Report Prepared for Prepared by Synovate September, 2003 Table of Contents Methodology...Page

More information

Identity Theft Repair Kit

Identity Theft Repair Kit Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact

More information

Prevention is Better than Cure: Protect Your Medical Identity

Prevention is Better than Cure: Protect Your Medical Identity Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical

More information

Identity Theft in Healthcare

Identity Theft in Healthcare Identity Theft in Healthcare Presented by: Donna Gilley, CCP, CHC Wynelle Paige, RHIA, CCP LBMC Healthcare Group, LLC Compliance Advisory Coalition Dgilley@lbmc.com mwpaige@charter.net 615-309-2376 865-621-2095

More information

Consumer Federation of America Best Practices for Identity Theft Services. Version 2.0. November 17, 2015

Consumer Federation of America Best Practices for Identity Theft Services. Version 2.0. November 17, 2015 Consumer Federation of America Best Practices for Identity Theft Services Version 2.0 November 17, 2015 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

CREDIT REPORTING GUIDE for

CREDIT REPORTING GUIDE for Attachment C CP&P 16-110 (new 8/2012) CREDIT REPORTING GUIDE for Table of Contents Introduction...Page 3 Instructions for Minors (Adolescents ages 16 & 17) Page 4 Instructions for Adults (Young Adults

More information

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost 2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost With passage of HR 2622, the Fair and Accurate Credit Transactions Act, Congress significantly amended the Fair Credit

More information

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters Dear Consumer, Sometimes an identity thief can strike even if you ve been very careful about protecting your personal information. If you suspect that your personal information has been stolen and used

More information

Reclaiming your identity

Reclaiming your identity Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist

More information

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

Identity Theft and Tax Administration

Identity Theft and Tax Administration PREPARED STATEMENT OF BETH TUCKER IRS DEPUTY COMMISSIONER FOR OPERATIONS SUPPORT BEFORE SUBCOMMITTEE ON FISCAL RESPONSIBILITY AND ECONOMIC GROWTH SENATE FINANCE COMMITTEE ON IDENTITY THEFT MAY 25, 2011

More information

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES 1 Effective Date: January 26, 2015 THIS NOTICE APPLIES TO THE UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM

More information

Effective Date: March 23, 2016

Effective Date: March 23, 2016 AIG COMPANIES Effective Date: March 23, 2016 HIPAA NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

Frequently Asked Questions. OPM Data Breach. Department of the Navy

Frequently Asked Questions. OPM Data Breach. Department of the Navy Frequently Asked Questions OPM Data Breach Department of the Navy 17 June 2015 (New Information Included) Table of Contents Summary... 2 Notification Update New... 2 General Information... 4 What s Next...

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity

More information

Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training

Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training Overview This Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training for first-tier, downstream and related entities

More information

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for

More information

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of

More information

Personal Digital Security

Personal Digital Security The following is an excerpt from: Personal Digital Security Protecting Yourself from Online Crime 2016 Revision by Michael Bazzell More information can be found at ComputerCrimeInfo.com Over the past ten

More information

Identity Theft Packet

Identity Theft Packet BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone

More information

Understanding Your Credit Report Rights. Legal Aid Society of San Diego, Inc. Consumer Protection Division

Understanding Your Credit Report Rights. Legal Aid Society of San Diego, Inc. Consumer Protection Division Understanding Your Credit Report Rights Legal Aid Society of San Diego, Inc. Consumer Protection Division One Free Copy Per Agency Every 12 Months The Federal Trade Commission guarantees you one free copy

More information

How To Protect Your Health Information From Being Stolen

How To Protect Your Health Information From Being Stolen Medical Data Breaches Susan Fowler Purdue University fowler16@purdue.edu Samuel Liles Purdue University sliles@purdue.edu Abstract Medically identifiable information is recorded, used, and stored in a

More information

4. Please submit response to the attached questionnaire in accordance to instructions.

4. Please submit response to the attached questionnaire in accordance to instructions. July 11, 2013 RE: Solicitation No. 7005944 - Identity Theft Protection Program The Dallas/Fort Worth International Airport Board (hereafter "Board or DFW Airport ) is seeking competitive, sealed proposals

More information

Notice of Privacy Practices for Protected Health Information (PHI)

Notice of Privacy Practices for Protected Health Information (PHI) Notice of Privacy Practices for Protected Health Information (PHI) Arapahoe Sports Medicine and Rehabilitation THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW

More information

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1 Identity Theft The Most Pervasive Financial Crime Today Presented by; Wells Fargo Corporate Security Wells Fargo All Rights Reserved 1 It s so very simple to be anyone you please, on any given morning

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Log on to: www.idprotectme247.com using Access Code AZ271653 to register and access the benefits provided by IDProtect.

Log on to: www.idprotectme247.com using Access Code AZ271653 to register and access the benefits provided by IDProtect. Banner Federal Credit Union is pleased to offer identity theft protection, powered by IDProtect Identity theft takes a serious financial and emotional toll on its victims. More than 11.6 million Americans

More information

Log on to: www.idprotectme247.com using Access Code MI521457 to register and access the benefits provided by IDProtect.

Log on to: www.idprotectme247.com using Access Code MI521457 to register and access the benefits provided by IDProtect. KALSEE Credit Union is pleased to offer identity theft protection, powered by IDProtect! Identity theft takes a serious financial and emotional toll on its victims. More than 11.6 million Americans were

More information

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags. Identity Theft Prevention & Detection Red Flags Rule Compliance Policy It is the policy of Kilgore Vision Center to follow all federal and state laws and reporting requirements regarding identity theft.

More information

Topic Overview Responding to Identity Theft: Civil Rights & Remedies

Topic Overview Responding to Identity Theft: Civil Rights & Remedies Topic Overview Responding to Identity Theft: Civil Rights & Remedies Suzanne Begnoche, Attorney at Law Chapel Hill, North Carolina suzanne.begnoche@begnochelaw.com (919) 960-6108 Client Screening Initial

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Provider Beware The Collateral Consequences of a Guilty Plea

Provider Beware The Collateral Consequences of a Guilty Plea Attorney General Medical Board Pharmacy Board Medicaid Health Department CMS DEA FBI Medicare OIG security You re A Target. We Can Help. Health care providers face more scrutiny than ever before. Government

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 Phone: (248)618-3467 Fax: (248)618-3515

Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 Phone: (248)618-3467 Fax: (248)618-3515 Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 HIPAA NOTICE OF PRIVACY PRACTICES PLEASE REVIEW THIS NOTICE CAREFULLY. IT DESCRIBES HOW YOUR MEDICAL INFORMATION MAY BE USED AND DISCLOSED AND HOW

More information

Consumer Information Sheet 16 October 2013

Consumer Information Sheet 16 October 2013 First Aid For Medical Identity Theft Tips for Consumers Consumer Information Sheet 16 October 201 When another person uses your personal information to get medical services or goods, or to gain financially,

More information

Oakland Family Services - Was Your Email Hacked?

Oakland Family Services - Was Your Email Hacked? Oakland Family Services Information Breach FAQs 1. What happened? An unauthorized individual remotely gained access to the email account of one Oakland Family Services employee July 14, 2015 resulting

More information

Identity Theft Problem and Solutions

Identity Theft Problem and Solutions Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or

More information