• No results found

Medical Identity Theft or Identity Fraud: Can You Afford the Results?

N/A
N/A
Protected

Academic year: 2021

Share "Medical Identity Theft or Identity Fraud: Can You Afford the Results?"

Copied!
35
0
0

Loading.... (view fulltext now)

Full text

(1)

The opinions expressed in this presentation are those of the speaker. The International Society and International Foundation disclaim responsibility for views expressed and statements made by the program speakers.

Medical

 

Identity

 

Theft

 

or

 

Identity

 

Fraud:

 

Can

 

You

 

Afford

 

the

 

Results?

Linda Vincent, RN, PI 

Principal 

Vincent & Associates 

The Identity Advocate 

San Pedro, California

© Vincent & Associates. Reprints available by permission

(2)

Goals

• What are the primary types of Medical and Identity theft

• How it happens-why critical information is stolen

• Why you should be concerned

• What to do to prevent and protect you and your employees identity, medical identity • What to do when it happens

PRESENTATION TITLE GOES HERE [EDIT IN HEADER & FOOTER SECTION (APPLY TO ALL)]

(3)

Identity

Theft—a

Growing Industry

• 1 in 4 lose their identity-2012-increase 13% – 11.6 million victims

• 1 in 8 lose their medical identity

• 1 in 10 people affected by Data Breach • Fastest growing white collar crime

– Now more than drug or prostitution

• Identity theft now occurs every 2 seconds • Identity recovery—9-600 hours

(4)

What

Criminals

Steal

• Names, addresses, date of birth

• Employment or healthcare information • Social Security numbers

• Drivers license or credit cards

(5)

Who

Steals

Your Information?

• Relatives/friends

• Organized crime rings

• Corrupt healthcare workers • Mail thieves

• Cyber Thieves=Hackers=Data Breaches

(6)

How Identity is Stolen

• Dumpster diving • Mail theft

• Check washing • Stolen wallets

• Telephone and E-mail Scams

• Obtaining deceased people’s information

(7)

The Price of Identity

• Social Security Number – Street value—$1.00

• Medical Identity Information

– Street value—

$50.00

– ‘Kitz’ available online criminal bazaars for $1,200 plus.

• Include a valid health insurance card • A supporting photo I.D

• Possibly a credit card

(8)

First Group Most Vulnerable

• The Elderly

– Boomers are very credit worthy

– Own children often take their ID for financial reasons – Less social media savvy

– Fall prey to online and door to door scams – Grandchildren scam

(9)

Second Most Vulnerable

• Children

– Clean slate

– Easier to get credit

– Watch if credit card aps come in mail – Sign them up for creditkarma.com

– Kids DO NOT need SSN for school . . . don’t give it to them

– Teach children what to share

– Be aware of Facebook . . . and shares

(10)

Third Most Vulnerable

• The Dead

– Scammers watch obituaries

– Death registry with social security is always behind – Proceed through permanent optoutprescreen.com – Lastly do not write an obituary with all important

dates of life

– In 2011, CMS paid $23 million to more than 17,000 deceased Medicare members

(11)

Fourth

Most Vulnerable

• Veterans

– Away from home for long periods of time – Good health care coverage

– Experienced one of country’s largest data thefts

(12)

Fifth Most Vulnerable

• Movie Stars/Sports Figures

– Seems to happen for the rush – Good health care

– Frequently imposters look like sports figure aren’t asked to ID

(13)

Last Group

• Those who post to social media

– From phone . . . while away

– From iPads . . . I'm at Starbucks – Birthday parties of children

– Geo-tagging from Facebook and other social sites

(14)

What

Is

Medical Identity Theft?

• Stolen or shared Member information • Improper or Fictitious beneficiaries • Stolen Physician information

• Healthcare ID cards compromised or shared • HealthCare Data Breaches

(15)

Why Medical ID Theft Occurs

• Numbers of active workers vs number of retirees

• Higher premium share, deductibles, treatment co-pays

• High unemployment • Changing benefits

• Confusion/controversy over ACA • Security of the ‘Navigators’ in HCR

(16)

Who Steals your Medical Identity

• Dishonest patients

• Dishonest providers (individuals or institutions)

• Professional criminals/bogus providers • Hackers

• Other parties to the system

– Dishonest billing services – Dishonest payer employees

– Non-practitioner “ring” participants

• Attorneys

• Recruiters/“cappers”

(17)

Latest Ponemon Survey

• Of 80 healthcare organizations 52% had one or more incidents of medical identity theft

over the past 12 months.

• Statistics (from IDTRC) as of July 1, 2014 there have been 381 breaches exposing 10,900,850 records

• Data Breaches average 416 days to detect • Breaches often reported by 3rd party

(18)

Medical Identity Theft the Impact

• Death

• Medical records in shambles • Physical harm

• Credit issues

• Employment issues

• On the hook for $22,000

• Recovery and dispute resolution taking more than a year

(19)

Medical Identity Fraud—

By the Numbers

• About 5.8% of ID theft crimes are Medical ID Theft

– 1.5 million victims

• 94% of providers have HC information breeches

– Patient or health plan information – Affected over 6 million Americans

– Estimated costs to HC industry $7 billion (Ponemon Institute)

Scary statistics

Only 1 in 700 identity thieves arrested

(20)

Medical ID Theft Statistics

• The amount victims pay each to resolve cases. More than half say they had to pay for medical care they didn't receive in order to

restore health coverage.

• Nearly half of victims also lost health coverage due to the fraud, and nearly one-third said their health premiums rose after they were victimized—$20,000

• The percentage of medical fraud victims who say their incidents were completely resolved.—<10

• Americans who have been victimized by medical identity theft— 1.5 million

• Percent of Americans age 18-49 carry their Social Security card in their wallet, putting them at risk for medical identity theft—36%

• Percent of Americans age 50 and over do the same—43% Source: Employee Benefit News, December 2011

Data Source: www.Insurancefraud.org

(21)

Data Breaches

• 94% of providers have HC information breeches

– Patient or health plan information – Affects 1.5 million Americans

– Medical ID theft occurs in 24% of breaches

• Common—stolen health care laptop • Hacking—because hacker can

(22)

Top Data Breaches

• Adobe breach rated the largest ever, leaking 152 million records

• Target breach, in at number 5 exposing 110 million records

• Pinterest API in March responsible for 70 million records lost

(23)

Top Healthcare Data Breaches

• Tricare—4,901,432 pts—loss of backup tapes • Health Net—1,9000,000—unknown reason • AVMed, Inc—1,220,000—laptop theft

• Blue Shield TN—1,023,209—hard drive theft

(24)

Top 3 Medical Data Breaches

in 2013

Advocate Medical Group

People Affected: 4,029,530

AHMC Healthcare, CA

People Affected: 729,000

Texas Health Harris Methodist Hospital

Fort Worth

People Affected: 277,014

(25)

Cyber Crime

According to the 4th Annual Cost of Cyber Crime Study:

$11.6 million: The average cost of a

cyber attack

122: The number of success attacks per week – 26 %: The increase in cyber attacks in one year

(26)

Other Cyber Issues

• Protecting your mobile devices – What are the choices

• What using the cloud can mean – Hijacking

– Ransom (Cyptolocker) • Hacking as a whole

– Norton's newest report claims 70% of the 18-34 year-old Internet users they spoke with have been victims of online fraud.

• Do you offer protection for and within your business – 256 bit encryption

– Cloud storage

(27)

5 Cyber Solutions

• Add Keepass or Lastpass to tablets

– https://lastpass.com/ or http://keepass.info/

• Add Lookout or Avast to cell phones

– https://www.lookout.com or http://www.avast.com/en-us/index

• Add Ccleaner to computer and laptops

– http://download.cnet.com/CCleaner/

• Use ‘Malwarebytes’ for key logger detection

– http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html

• Consider paid VPN for email and online communication

(28)

First Steps to Prevent Identity Theft

• SHRED EVERYTHING!

• Review credit reports 1x/yr—each agency

– Sign up for CreditKarma—free monitoring

• Place a fraud alert on credit bureaus

• Place a credit freeze with each credit bureau

– Can mean unfreezing at later date

• Use gel pens

• Make a copy of contents of your wallet

• Never put your social security number on your checks, or carry it

(29)

7 Ways to Avoid Medical

Identity Theft

• Always check EOBs (explanation of benefits)

• Request/review/ annual ‘benefits paid’ from insurer • Keep your own copies of all your health records

• Eliminate SSN and total DoBs from records • Never share your health insurance card

• Shred all medical documents

• Never partake of “free” medical care

• Don’t throw away prescription bottles with name and info on it.

• Report and replace lost/stolen insurance cards

(30)

6 Things to do When it Happens to

YOU

• Call 877-ID-Theft (438-4338)—FTC

• Call Police—file a police report

• Put a fraud alert on your credit report-then freeze it

• Get a copy of your credit reports

• Call your bank

• Cancel credit cards

(31)

Opt Out of Pre-Approved Credit

Cards or Junk Mail

• Call 888-567-8688

• Visit www.optoutprescreen.com

• Mail Preference Service

– Direct Marketing Association

– P.O. Box 643, Carmel, NY 10512

(32)

Individual Credit Agencies

• Equifax—www.equifax.com 800.525.6285

– Ordering single credit report 800.685.1111

• Experian—www.experian.com 888.397.3742

– Also 800.311.4769

• Transunion—www.tuc.com 800.680.7289

– Also 800.916.8800-fraud alerts

• Social Security Administration 800.269.0271 • Federal Trade Commission 877.382.4357 • IRS Theft Hotline at 800-908-4490

(33)

Handy Web Sites

• www.theidentityadvocate.com • www.ftc.gov • www.worldprivacyforum.org • www.Idtheftcenter.org • www.stopmedicarefraud.gov • www.nhcaa.gov • www.insurancefraud.org • www.fightfraudamerica.com 16C-33

(34)

Resources

• http://keepass.info/ • https://lastpass.com/ • http://www.theidentityadvocate.com/identity-theft-protection.php • http://www.yourid360.com/ 16C-34

(35)

Questions

References

Related documents

Safe, efficient self ‐ driving cars could block walkable, livable Safe, efficient self driving cars could block walkable, livable communities.. communities

A. If you are a victim of identity theft, the Fraud Assist Toolbox can help you with several of the most common types of fraud tactics, such as identity theft related to credit

Our Identity Protection Support Service, provided by Trilegiant Corporation, offers an array of identity fraud services to help victims of identity theft restore their peace

Of 141 million online adults, more than 30 million (19 percent) stated that the e-mail that they received &#34;definitely was a phishing attack&#34;; 27 million (22 percent) thought

In order to understand non-financial benefits for corporations, this dissertation is aiming to understand whether and how individuals who have participated in

Conclusions/Significance: This study is the first protein expression study of the PhoP virulence associated regulon using strains of Salmonella mutant in PhoP, has identified

5.4 Comparing the Performance of the IDE Disk on an x8 Link, Using Different Switch and Root Port Buffer Sizes. In this experiment, PCI Express links are kept as x8, while varying

 If Arc Pro Server is installed on the same blade as (is co-resident with) another Cisco application, including Cisco Unified Communications Manager and Unity, the Arc Pro