The High Price of Medical Identity Theft and Fraud



Similar documents
The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance

The Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA

2013 Survey on Medical Identity Theft

Third Annual Survey on Medical Identity Theft

Fifth Annual Study on Medical Identity Theft

Healthcare Utilizing Trusted Identity Credentials

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL

Medical Identity theft

Medical Identity theft

The Growing Threat of Medical Identity Fraud: A Call to Action. A Publication of The Medical Identity Fraud Alliance July 2013

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

How child identity theft happens.

Click to edit Master title style Fighting Back Against. Identity Theft and Online Fraud. Click to edit Master text styles Second level Third level

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Red Flag Policy and Procedures for Alexander Orthopaedic Associates

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

How the IRS Helps Taxpayers and Assist Victims

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Integrity We are above reproach in everything we do.

Scope All [Name of Facility] operations

The elderly are often specifically targeted for identity theft. Identity

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia (404) (404)

NOTICE OF PRIVACY PRACTICES TEMPLATE. Sections highlighted in yellow are optional sections, depending on if applicable

White Paper. Data Breach Mitigation in the Healthcare Industry

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)

IRS Payroll Topics. Alan Gregerson. VOH to Hires Act of Qualified Veteran WOTC. March 15, 2012

NOTICE OF HEALTH INFORMATION PRACTICES

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims

HIPAA Security Manual Administrative Security/Omnibus Rule

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

Medicare Compliance and Fraud, Waste, and Abuse Training

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program

Identity Theft. What it is and How to Protect Yourself

Weber Human Services Identity Theft Prevention Policy

How the IRS Helps Taxpayers and Assists Victims

The World of Identity Theft from the IRS s Point of View

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN Ph: (952) Fax: (651)

Finding a Cure for Medical Identity Theft

March 22, Tennessee State Employees Association 627 Woodland Street Nashville, TN 37206

Data Breach and Senior Living Communities May 29, 2015

Network Security & Privacy Landscape

SCAM JAM ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

Compromises in Healthcare Privacy due to Data Breaches

Tax Identity Theft. Identity Theft as of 2010 has become the most prevalently reported crime in the world exceeding credit card theft

PRIVACY AND IDENTITY THEFT 2003:

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Notice of Privacy Practices

Forensic Accounting and Identity Theft. Georgia HFMA Financial Executives Meeting December 12, 2014

Prepared by Sgt. Gibbs, Thomas B

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010

Arkansas Small Business Forum. IRS Identity Theft Prevention Efforts

Family Protection Plan

Federal and State Government Identity Theft and Protection Initiatives

General Q&A Northland Pioneer Personal Data Security Incident

Medical Information Breaches: Are Your Records Safe?

Data Security Incident Response Plan. [Insert Organization Name]

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

Federal Trade Commission Identity Theft Survey Report

Identity Theft Repair Kit

Prevention is Better than Cure: Protect Your Medical Identity

Identity Theft in Healthcare

Consumer Federation of America Best Practices for Identity Theft Services. Version 2.0. November 17, 2015

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

CREDIT REPORTING GUIDE for

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

Dear Consumer, What's in this packet: Identity Theft Victim Checklist Identity Theft Victim Worksheet Sample Letters

Reclaiming your identity

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

Identity Theft and Tax Administration

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES

Effective Date: March 23, 2016

Frequently Asked Questions. OPM Data Breach. Department of the Navy

Identity Theft Protection

Medicare Advantage and Part D Fraud, Waste and Abuse Compliance Training

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

Personal Digital Security

Identity Theft Packet

Understanding Your Credit Report Rights. Legal Aid Society of San Diego, Inc. Consumer Protection Division

How To Protect Your Health Information From Being Stolen

4. Please submit response to the attached questionnaire in accordance to instructions.

Notice of Privacy Practices for Protected Health Information (PHI)

Identity Theft. The Most Pervasive Financial Crime Today. Presented by; Wells Fargo Corporate Security. Wells Fargo All Rights Reserved 1

HOME DEPOT DATA BREACH

Log on to: using Access Code AZ to register and access the benefits provided by IDProtect.

Log on to: using Access Code MI to register and access the benefits provided by IDProtect.

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.

Topic Overview Responding to Identity Theft: Civil Rights & Remedies

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Provider Beware The Collateral Consequences of a Guilty Plea

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

Dr. Adam Apfelblat 5140 Highland Road Waterford Phone: (248) Fax: (248)

Consumer Information Sheet 16 October 2013

Oakland Family Services - Was Your Hacked?

Identity Theft Problem and Solutions

Transcription:

The High Price of Medical Identity Theft and Fraud

Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar with medical identity theft 3 The average per record cost of a data breach for U.S. organizations is $201 4 Healthcare sector $316 per record $70B improper CMS payments in 2010 1 2015 Javelin Strategy & Research Identity Fraud Study 2 2015 Javelin Strategy & Research Identity Fraud Study 3 2012 Harris Interactive/Nationwide Study: Few Aware of Risk of Medical Identity Theft 5 2014 Cost of Data Breach Study (US), IBM/Ponemon 2

Medical Identity Theft & Fraud Theft of PHI for the purpose of financial gain or to unlawfully obtain medical goods or services Use of medical ID not your own, or fictitious/synthetic identity, to obtain goods and services, or to unlawfully financial gain Obtaining insurance, prescription drugs, healthcare treatment and medical goods, employment, government benefits or other financial gain May involve financial gain both from the sale of stolen PHI/PII or from the use of PHI/PII to obtain medical goods and services 3

Unique Medical ID Fraud Experience Corrupted medical records can be life-threating PHI is not easily closed or changed Financial liability not limited No healthcare equivalent of Fair Credit Reporting Act (FCRA) Costs borne by all parties no set practice 4

Survey on Medical ID Theft The 2014 Fifth Annual Study on Medical Identity Theft, sponsored by MIFA and our members, measures the prevalence of medical identity theft in the United States and its impact on consumers Surveyed 1,005 adults (aged 18+), who self-reported they or close family members were victims of medical identity theft For purposes of the study, medical identity theft occurs when someone uses an individual s name and personal identity to fraudulently receive medical service, prescription drugs and goods, including attempts to commit fraudulent billing 5

Survey Highlights Medical identity theft is growing Base rate of victims increased from.0053% in 2010 to.0102% in 2013 2.3 million adult-aged victims of medical identity theft in 2014 Nearly 500,000 estimated new victims in 2014 21.7% increase in from 2013 to 2014 $20 billion estimated out-of-pocket costs for victims Reputational risks for healthcare providers & victims Resolution of the crime is time-consuming Medical identity theft can put victims lives at risk About half of medical identity theft may be preventable 6

Contributing Factors Pervasiveness of electronic PHI Increasing alternative delivery models that include care outside of facilities Increasing number of individuals with healthcare benefits High value of PHI on black market Emerging technologies cloud, mobile & BYOD, IoT Changing legal & regulatory landscape Criminals are highly organized industry is less organized Pay and chase model Lack of coordinated response by public & private sectors to specifically address PHI privacy & security 7

How It Happens Friends & Family crime Phished Data breach Insider/bad actor at healthcare provider or plan Lost wallet or other PHI-containing item PHI intercepted by crook email, post mail 8

Discovering Medical ID Theft Collection letter Adverse entry on credit report Errors in invoices from healthcare provider EOB errors Mistakes in health records Informed by healthcare provider Data breach notification Law enforcement 9

Non-Medical Consequences 89% of those with negative reputational impacts expressed embarrassment from disclosure of sensitive medical information Employment related difficulties Revocation of professional licenses Lost time and productivity fixing inaccuracies in records Financial ID theft Out-of-pocket costs for resolution 10

Financial Impact 65% Of victims paid an average $13,453 out-of-pocket Reimbursements to healthcare provider for services to ID thief Payments to health plan Identity protection, credit reporting, legal counseling Diminished credit scores Increased health insurance premiums Legitimate health plan claims denied 11

Medical-related Consequences Misdiagnosis Mistreatment Incorrect medication prescribed Delay in receiving healthcare, treatment Lost health insurance coverage Lost trust/confidence in healthcare provider post-breach 12

Preventable Fraud Sharing of personal identification for medical services is prevalent 49% had their personal identification or medical credentials shared with someone they knew 25% willingly shared 24% family member or friend took identification or medical credentials without consent Consumers don t understand significant consequences from comingled health records 13

Education Needed 60% do not check their medical records for accuracy Don t know how Trust their providers to be accurate Did not think of it Records not easily accessible Don t care 50% do not review their EOBs at all Trust accuracy Do not understand or think the document is confusing Not important 14

Resolving the Crime Only 10% reach resolution Worked with health plan or healthcare provider to resolve Repaid healthcare provider or health insurer for services rendered to fraudster Obtained and reviewed credit reports Purchased identity protection services Contacted credit bureaus Engaged legal counsel Engaged non-profit that provides victim assistance 15

What Industry Can Do Stop usage of SSN as an identifier or as part of PHI; shift to other personal identifiers Take an eco-system stance Review of business associates security & privacy practices Enterprise-wide approach it s not just the CISO s responsibility Sound policies around cloud, mobile and BYOD, emerging technology Staff training insider threat is real Consumer education 16

Strength in Numbers to Reduce Medical ID Theft & Fraud Conduct research to understand the root causes of medical identity fraud, including internal and external sources. Participate in a community of industry knowledge experts to develop industry best practices, policies and best-in-class technologies for fraud detection and prevention Inform and influence public policy by building relationships with law enforcement and regulatory agencies (FBI, OIG, FTC, OCR), and advocating on behalf of consumers 17

Ann Patterson Medical Identity Fraud Alliance @MedIDFraudAssoc 18