Whether it’s from a large-scale breach or the theft of an individual’s data. Let’s go over what medical identity theft is, its consequences, and how to prevent it.
In 2022, 707 healthcare breaches affected 52 million patients. When you think of a data breach, your mind might go to credit card fraud or identity theft in general. These are both huge risks when it comes to the security of personal information. But, unfortunately, the risks don’t end there.
Medical identity theft, although not as common, proves to be a dangerous reality when it comes to healthcare data breaches. This is a concern for not only patients but healthcare providers and insurers as well.
Medical professionals and patients must understand this kind of fraud can happen in several ways. Whether it’s from a large-scale breach or the theft of an individual’s data. Let’s go over what medical identity theft is, its consequences, and how to prevent it.
The Federal Trade Commission (FTC) states that medical identity theft occurs when someone uses someone else’s medical information to receive treatment. Medical identity theft can also happen if a medical professional uses a patient’s information to submit false claims to payers.
Personal information that can compromise a patient’s identity can include:
Medical identity theft poses different challenges than other forms of identity fraud. Not only does the perpetrator steal their victim’s data, but they put the patient at risk by messing with their medical data and history.
Imagine having a stranger’s medical information mixed with your own. You might be at risk of having your prescriptions changed or what health benefits you’re able to use.
When dealing with medical identity theft, patients may:
When it comes to medical identity fraud, these are only a few of the consequences a patient might deal with. Let’s dive deeper into what this crime does to both the victims and the medical professionals involved.
One of the scariest things about medical identity fraud is that it can take a long time to recognize it. Sometimes months go by without any indication, other times it might take years. The amount of damage done in that amount of time is often devastating to both the patient and the healthcare professional.
When it comes to the provider, their first red flag might be the notice of overpayment from an insurance program. This ends in the payer demanding immediate repayment. Providers might also receive a notification straight from the Internal Revenue Service (IRS). Healthcare professionals earning income for services never reported on tax documents will most certainly end with your friendly neighborhood IRS employee knocking on your door.
Overpayment letters and correcting credit issues are a few of the consequences of medical identity theft. Sorting out these problems alone requires time, effort, and money. On top of running a business? Well, this can put someone out of business. You might be able to take care of the financial aspect of something like this, but the impact of these consequences on a professional’s reputation can be difficult to fix.
Even if a provider hasn’t done anything wrong, for example with a security breach, consequences can be severe. Luckily most healthcare professionals do the right thing when it comes to reporting medical fraud. However, for those few who do not or worse, actively take part in it - the consequences are even more devastating.
Providers voluntarily permitting the misuse of patient’s identities can lead to consequences such as:
Some common examples of healthcare professionals misusing protected health information (PHI) include:
Providers must be wary of people who want to abuse the system. Those people may try to make a case out of convenience or sympathy that their provider should accommodate one of these requests. Your signature as a healthcare provider holds you liable for fraudulent claims.
When it comes to preventing medical identity theft, healthcare providers play an important part in safeguarding PHI. Here are some steps you can take as a healthcare professional to reduce the likelihood of this crime affecting you or your patients.
One of the best ways to protect yourself from medical identity fraud is to understand the signs and causes. Train your staff in the Health Insurance Portability and Accountability Act (HIPAA) to understand the importance of patient confidentiality.
A HIPAA violation can easily (and quickly) turn into a data breach, thus opening your practice up to medical identity theft. Be sure to keep up with regular training and make sure your employees continue to renew their HIPAA certifications yearly to avoid legal ramifications if a breach occurs.
HIPAA compliance is only one part of the puzzle when we think about healthcare organization security. Cybersecurity goes hand in hand with HIPAA, as most of our medical records are now online. A breach in your cybersecurity means access to PHI.
Similar to HIPAA training, make sure your employees are current with the latest cybersecurity guidelines.
Cyber and physical security looks like:
Implement policies and procedures to minimize the risk of a cybersecurity breach. This alone will strengthen your compliance program and organization’s integrity.
Do you want to hear more tips on how to protect your electronic protected health information (ePHI)? Not sure where to start on your HIPAA compliant-audit checklist? No worries! We’ve got your back.
Utilizing a Multi-Factor Authentication (MFA) will help protect against wandering eyes. Having a second layer of defense when logging into software that holds patient records helps to ensure that the person logging in is who they say they are.
Implementing patient verification on top of this is also recommended to help keep ePHI safe. This can look like asking for multiple forms of identification during registration.
Incorporating regular data backups, which include patient data, ensures the security of information in an offsite location. So, in the event of a data breach or a system failure, PHI is not lost forever.
Similarly, make sure your organization has a disaster recovery plan. This is so you can quickly restore that saved information in case of a breach or data loss.
Even if you back up your information safely on an offsite storage system, it’s a good idea to periodically review your data security practices. Performing regular security assessments is also a great way to strengthen your HIPAA compliance.
Consider the following when performing your security assessment:
Finally, don’t be afraid to communicate with your patients. Transparency between a provider and their patient builds a foundation of trust. Be sure your patient understands their rights and the importance of protecting their personal information through a Notice of Privacy Practices. This not only ensures your patient knows how to keep themselves safe, but can save you from any future liabilities.
This notice should include the contact information of someone in your organization. This person is in charge of responding to any questions or concerns someone might have about the status of their PHI.
As a provider, make sure you encourage your patients to request and review their medical records. Who better to spot fishy activity, such as past services they never received, than the patients themselves?
Immediately launch an investigation at the first sign of medical identity theft. If your billing department receives a call about an inconsistency in their medical records, review them along with any supporting documents. Be sure this documentation verifies the identity of the person receiving the services.
If you determine there was medical identity theft, notify everyone involved. This includes anyone who previously accessed the patient’s medical and billing records.
Your patients should then file a complaint with the FTC. They should also file a report with their local police department, as well as update their health plan’s fraud department.
Medical identity theft has the potential to seriously affect both patients and providers.
Luckily, being aware is half of the battle, so by reading this blog you’re closer to better securing your PHI.
Remember that HIPAA and cybersecurity regulations offer a solid set of guidelines to protect against this crime. Focus on your HIPAA and cybersecurity compliance practices to better protect sensitive information, as well as your organization’s reputation.
In nec dictum adipiscing pharetra enim etiam scelerisque dolor purus ipsum egestas cursus vulputate arcu egestas ut eu sed mollis consectetur mattis pharetra curabitur et maecenas in mattis fames consectetur ipsum quis risus mauris aliquam ornare nisl purus at ipsum nulla accumsan consectetur vestibulum suspendisse aliquam condimentum scelerisque lacinia pellentesque vestibulum condimentum turpis ligula pharetra dictum sapien facilisis sapien at sagittis et cursus congue.
Convallis pellentesque ullamcorper sapien sed tristique fermentum proin amet quam tincidunt feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Feugiat vitae neque quisque odio ut pellentesque ac mauris eget lectus. Pretium arcu turpis lacus sapien sit at eu sapien duis magna nunc nibh nam non ut nibh ultrices ultrices elementum egestas enim nisl sed cursus pellentesque sit dignissim enim euismod sit et convallis sed pelis viverra quam at nisl sit pharetra enim nisl nec vestibulum posuere in volutpat sed blandit neque risus.
Vel etiam vel amet aenean eget in habitasse nunc duis tellus sem turpis risus aliquam ac volutpat tellus eu faucibus ullamcorper.
Sed pretium id nibh id sit felis vitae volutpat volutpat adipiscing at sodales neque lectus mi phasellus commodo at elit suspendisse ornare faucibus lectus purus viverra in nec aliquet commodo et sed sed nisi tempor mi pellentesque arcu viverra pretium duis enim vulputate dignissim etiam ultrices vitae neque urna proin nibh diam turpis augue lacus.