Medical Information Fraud Case Study

Improved Essays
Transformation to electronic health records (EHR) has made patient records more vulnerable to data breaches. The top causes of medical data breaches that compromised PHI included theft, computer hacking, error by third-party custodians, and human negligence. Theft can be from an insider working at a health care facility who abuses their access privileges to information. Such employees seek information for the purpose of committing fraud. Theft can also be attempted by an outsider who can physically enter the organization and steal equipment such as laptops, smartphones, servers or USB drives. Data breaches by way of hacking is gaining popularity. This is evident from the recent cyber-attack on Anthem's information technology system. Hackers …show more content…
Healthcare consumers are the primary victims who experience loss of privacy and confidentiality, improper denial of insurance, loss of credit rating, loss of time and money, and impaired health resulting from inaccurate treatment (McNabb & Rhodes, 2014). A medical identity thief can cause incorrect information to be associated with the victim's health history. Since health care providers rely on medical history for diagnosing and treating patients, incorrect medical information can impair a provider's ability to treat the patient. For example, an incorrect blood type or drug allergy entered into a victim's chart can have disastrous consequences for the victim, particularly in emergencies. An imprecise medical history associated with the identity thief can also impact the cost and availability of health and life insurance by making a victim appear to be at a higher-risk than he or she actually is. Moreover, due to medical identity theft, the victim could be billed for services that were not received. Insurance companies can also deny to pay for medical care needed by the victim if the victim’s records show that it has already been provided to the thief. Additionally, time and money spent by the victims to correct their records is enormous. According to Downing, 2014 the average out of pocket expenses incurred by victims amounted to $18,660, and in a few cases exceeded to $100,000 (p.50), for reimbursement services, legal fees, and identity protection services. The impact of medical identity theft on healthcare providers, insurance companies, and local and national agencies are also huge and accounts for legal, financial, and public image

Related Documents

  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members.” The information that was hacked included: names, date of birth, social security numbers, medical ID numbers, street and e-mail addresses, employment and income information. No medical information was stolen, so this case was not ruled by Health Insurance Portability and Accountability Act (HIPAA). The investigation revealed the hackers used the computer…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Salamander Case Summary

    • 130 Words
    • 1 Pages

    Based on this evidence presented, Mr. Salamander has failed to comply with a number of laws which are placed in order to protect the privacy of the patients. For example, one law is the Health Insurance Portability and Accountability Act (HIPPA). “Title II of HIPAA defines policies, procedures and guidelines for maintaining the privacy and security of individually identifiable health information”. [1] This law was enacted in order to protect an individual’s Protected Health Information (PHI). In this case, Bill and Anna, both who could be recognized as “offenses committed with the intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain or malicious harm.…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Barbara Reuter Fraud

    • 669 Words
    • 3 Pages

    In 2006 in Edmonds, Washington, a woman from Everett by the name of Barbara Reuter who was 48 years old, stole information about her homeless shelter roommate. She stole her name, social security number, date of birth and other information in order to commit medical identity theft. Her roommate was a Medicaid client from DSHS in Washington State. Barbara assumed her identity to go to doctors. She would then present certain symptoms to the doctors in order to get a prescription for narcotics.…

    • 669 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HIPAA Violations

    • 355 Words
    • 2 Pages

    In order to achieve interoperability there are basic security standards that must be accounted for to ensure safe and secure exchange. Without adequate safe measures in place, personal health records cannot be safely transmitted electronically. Exchanging private health information electronically between medical partners comes with inherent risk however. Those risks include violation of HIPAA regulations and threats, vulnerabilities and malware that threaten electronic health records (EHR) or mainframe servers.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    With the use of EHRs, protected health information is portable and accessible to numerous organiztions and providers, which raises questions of ownership and the healthcare provider’s responsibility to prevent security breaches. Additionally, EPs are responsible for informing patients of any data comprises or breaches. There have been instances of EHR vendors selling unidentifiable copies of patient records to pharmaceutical companies, as well as medical device makers and researchers. However, other data sources can be used to render unidentifiable records, identifiable. Ethics questions arise with the buying and selling of patient health information.…

    • 1424 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    A breach is a breach, no matter how insignificant the incident. A myriad of scenarios available by patient data includes identity theft to the sales of patient info for medical and pharmaceutical purposes. Upon further investigation regarding various breaches in data, the numbers are shocking. Moreover, while every individual affected by the breach was not maliciously targeted, the fact remains that the information is/was unsecured in some form or fashion. The table listed below represents the percentage of individuals affected by a breach incident reporting 500 or more in the last 12 months (U.S. Department of Health & Human Services,…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    The Health Insurance Portability and Accountability laws created a standard in protecting people’s health information. As people…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Fourth Amendment Privacy

    • 453 Words
    • 2 Pages

    For as long as the United State’s government has been formed, there has been the argument of how much individual privacy people deserve. Cornell University Law School states the fourth amendment as "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. " The government though presents the argument to gain access to people’s lives for safety preventing terrorism, such as the unforgettable day of September 11, 2001. Also, the government uses medical records turned in…

    • 453 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the U.S., 50 million people depend on the Medicare program for their health needs, and the taxpayers bear the burden of $600 billion per year to fund the program. Therefore, the program’s administration is compelled to curtail Medicare related fraud, abuse and wastage of resources that add up to about $58 billion annually – or approximately 10 percent of the budget. For the last two decades, Medicare fraud has infested the program like an incurable cancer with over $1 trillion compromised. With the ever-expanding complex program, how would it be possible to develop and use a range of tools as a panacea to increase an oversight and scrutiny that would eventually lead to proper and efficient use of scarce resources in the future?…

    • 986 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Welfare Fraud Case Study

    • 882 Words
    • 4 Pages

    243 people, including doctors, nurses, and other healthcare professionals were thought to be suspects and questioned. They were taking money from health care, psychotherapy, and pharmacy. More than 44 people in Florida were arrested (Eichenwald, 2000). The company plead guilty to charges of them cheating the government health care (Eichenwald, 2000). Some of the facilities billed people for equipment they did not own, charged patients for treatments there were not needed or treatments that did not happen, or treatments that were needed but were never received (Eichenwald, 2000).…

    • 882 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Over the past decade, the term fraud has been brought to the forefront of coding and billing practices. Upcoding, unbundling or billing for services that are not documented are serious concerns for practices and payers. In a release from the Centers for Medicaid and Medicare Services, it was revealed that up to 30% of claims paid contained errors. Almost half of these were due to insufficient documentation (Prophet & Hammen, 1998). Ethics plays a big role in every aspect of health care, especially in medical coding and billing.…

    • 1214 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Fraud frequently involves practices such as overcharging, billing for services not rendered, and provision of needless or unsuitable medical services, unbundling, and upcoding amongst others. While early cases of fraud during the last century were mainly limited to individual consumers or healthcare providers targeting insurance providers, fraudulent schemes have progressed with time into highly organized complex networks. The complex nature of healthcare insurance makes uncovering of fraud or abuse a substantial challenge by the pertinent authorities. According to estimates by various anti-fraud departments such as the Federal Bureau of Investigation, the Government Office and the National Healthcare Anti-Fraud Department indicate that fraud accounts for 3 to 10 % of the national healthcare spending (Smith,…

    • 1489 Words
    • 6 Pages
    Superior Essays