Arguments Against Medical Identity Theft

Decent Essays
Identifying medical identity theft early can help reduce the expense and harm to patients. Tell your patients to closely scrutinize their medical bills. They also should verify whom they are speaking with when they are asked to provide medical information. Medical identity thieves often pose as insurance company representatives, doctor's offices, and pharmacies in order to steal patients' personal information.

Patients need to be vigilant in looking for other signs of medical identity theft such as receiving bills for services that were never provided, calls from medical debt collectors, or collection notices from healthcare providers that never provided services to the patients. A more advanced case might be detected when the patient gets

Related Documents

  • Decent Essays

    If I had discovered this fraud before the government audit, I would have investigated the allocations, checked the billing and coding of medical claims for billing and coding errors, I would have looked for possible up coding, unbundling…

    • 299 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    This investigation stems from Dr. Fonn self-reporting that he his privileges had been suspended for 30 days from a hospital in Cape Girardeau, MO. It was due to alleged conflict of interest and federal prosecution for Anti-Kickback law violations. He also answered positive to remuneration for two cases in the past year. A case was opened.…

    • 857 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members.” The information that was hacked included: names, date of birth, social security numbers, medical ID numbers, street and e-mail addresses, employment and income information. No medical information was stolen, so this case was not ruled by Health Insurance Portability and Accountability Act (HIPAA). The investigation revealed the hackers used the computer…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Salamander Case Summary

    • 130 Words
    • 1 Pages

    Based on this evidence presented, Mr. Salamander has failed to comply with a number of laws which are placed in order to protect the privacy of the patients. For example, one law is the Health Insurance Portability and Accountability Act (HIPPA). “Title II of HIPAA defines policies, procedures and guidelines for maintaining the privacy and security of individually identifiable health information”. [1] This law was enacted in order to protect an individual’s Protected Health Information (PHI). In this case, Bill and Anna, both who could be recognized as “offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain or malicious harm.…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    1. Describe the term HIPAA. Health Insurance Portability and Accountability Act which is simply known as HIPPA was put into play in 1996 for health care fields and facilities. This act allows patients personal healthcare information to be protected from being used or shared with anyone unless the patient writes a hand consent saying otherwise. Each patient’s healthcare information is kept in medical records, billing records, and health insurance computer systems.…

    • 210 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Lisa Eramo Cloning

    • 602 Words
    • 3 Pages

    Eramo (2017) described several situations where patient safety was severely compromised, and some even resulted in death. In one instance, a patient who had presented to the emergency department with atrial fibrillation was discharged to his primary care physician, and the admitting physician copied the same assessment over twelve office visits over a 2-year period. Consequently, the patient died from a myocardial infarction and the physician was successfully sued. In another instance, a child was diagnosed with tuberculosis meningitis who had suffered significant deficits after weeks of office visits with copied documentation of negative TB exposure results, despite the child having recently traveled to a country where tuberculosis is endemic. Other examples of consequences include HIPAA violations associated with copied physician’s notes, legal ramifications from false documentation, and increased costs associated with duplication of…

    • 602 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Furthermore although not discussed in this case the other relevant facts including the billing fraud with regard to the length of the procedures, does speak to the fact of a current of underlying fraud which does lead to intent. In order to avoid the appearance of inducements, each physician should bill Medicare directly for their services, eliminating Dr. Graber from the equation and preventing the appearance of fraudulent…

    • 449 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    From these data, we cannot tell whether this is because they did not have to or because they chose other avenues to obtain the care, or whether their patients did not receive needed care. The last scenario would be particularly worrisome for patients and their physicians, in part because current case law suggests that physicians are legally accountable for providing needed care and that they do not derive legal immunity by agreeing to accept health plan coverage rules. That is, compliance with health plan rules does not provide protection against malpractice litigation and losses stemming from failure to provide an acceptable standard or care. Of course, failure to adhere to health plan coverage rules and manipulating these rules, even to benefit patients, also has potential legal repercussions.” My own conclusion is that this is a very scary situation in that if physicians are exaggerating the severity of patients conditions, reporting false signs and symptoms, and changing diagnoses when billing patients this could actually harm the patient in the future say if they are seen by other health care professionals who do not know their true health condition and they are then mistreated due to false signs and…

    • 1392 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Problem Statement: Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”.…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Countless government health programs are damaged by fraud. Medicare and Medicaid fraud happens when someone knowingly bills the government for labor and supplies that were never provided. There are several different types of fraud that can be executed. Billing Medicare, and Medicaid for labor or equipment that is different from what they received is an example. Usage of someone else’s Medicare or Medicaid benefits to receive medical care, supplies, or equipment is another form of fraud.…

    • 769 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Healthcare Vs Medicare

    • 632 Words
    • 3 Pages

    When a doctor or medical specialist charges for services not done or upcharges the patient that is fraud. We as billers and coders have to keep our eyes open for anything we see that does not look right and report it immediately. Here is an article about the now Governer of the State of Florida and how he defrauded Medicare and Medicaid and how much he was fined but never charged with the crime: A former accountant turned FBI whistleblower said Monday that he is convinced Gov. Rick Scott was well aware of widespread wrongdoing within his former hospital chain and was at one point a target of a federal criminal investigation. John Schilling, 52, a registered Republican from Naples, said that within six months of being hired at Columbia/HCA, Inc., in 1993, he found the company was preparing two sets of auditing books — one for submission to the federal government to obtain Medicare reimbursement and the other for internal recordkeeping that was stamped…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Have they ever considered what happens to their paper medical records if they are missing or lost? As of 2014, the federal government has required that all health care providers implement electronic medical records within their systems. Electronic health records provide a better way to treat patients; they are more accurate, easier to read and to be understood, as well as having the ability to share patient information with the healthcare community. Although some doctors believe that paper documents are less expensive than that of electronic documents, they are a better choice because they provide a better healthcare system. Electronic medical records are used to create a more efficient healthcare system, and therefore should be used universally.…

    • 987 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Mystery Shopping

    • 351 Words
    • 2 Pages

    Deficiencies in the quality of care delivered to patients are an issue that many healthcare organizations constantly develop plans to improve. To identify the deficiencies present “mystery shoppers” have been widely utilized. The idea of mystery shopping is very common in the retail industry; however, it can be used in the healthcare industry. In a study by Doctor Lazarus Arthur titled Improving Psychiatric Service Through Mystery Shopping, tells that “Persons pretending to be patients have found discrepancies between the service promised and the service delivered, leading to positive changes, such as reduced waiting times, increased retention of patients within medical practices, better explanations of procedures and proposed treatments, and improved encounters with office staff, physicians, and other healthcare providers (Lazarus, 2009).”…

    • 351 Words
    • 2 Pages
    Improved Essays