Pros And Cons Of Medical Identity Theft

Improved Essays
Medical Identity Theft Out of all the places we should feel our identities to be most secure, the individualized, private rooms where we discuss our latest health concerns should be one of them. Unfortunately for some, that is not always the case. Although identity theft is more popularly known as the act of an individual taking one’s personal information for financial gain, it can also occur within the healthcare field (American Optometric Association). Not only do individuals fall victim to the theft of their medical identities, through the means of others having access to their medical records, but along with that comes a more sinister side to medical identity theft; one that is often unexpected and can rarely be prevented. Though it …show more content…
As easy as it is for a criminal to obtain a person’s credit card or social security information, it is now just as simple for that same person to have access to a patient’s entire medical record. Research conducted by various organizations such as, the Identity Theft Research Center, found that approximately “8.4 million people were hit with identity theft in 2013- that’s up 19% from 2012” (Satter). So what makes taking someone else’s medical identity so appealing? Unlike other forms of identity theft, financial gain is not always the forefront motive for this type of thieving, but receiving “medical treatment, prescription drugs, or surgery,” that an individual has not been authorized for, sometimes is (American Optometric Association). Even though financial gain is not always the primary motive, it is important to note that according to the World Privacy Forum, “the “street value” of a stolen Social Security number is valued at $1, whereas the “street value” of stolen medical identification information is worth $5” (Terry). The difference in value may speak to why medical identity theft cases are …show more content…
In some cases individuals will come into the pharmacy claiming to be a relative of a patient so that they may have access to drugs not intended for their use. Another instance is when individuals will attempt to have many of the same prescriptions filled at different pharmacies. In this particular situation that individual is seeking to have an excessive amount of drugs for either personal use or to sale. Even though these people are not necessarily taking the identity of someone else, they are manipulating the care of workers in the medical field in order to receive additional treatment or medicine not intended for them. By taking on the identity of a sick patient, in order to receive extensive amounts of medication used for one’s own recreational purposes, is a form of medical identity theft.
One can spend all the time in the world researching medical identity theft; ways to detect it, along with ways to prevent it. What these articles and research fail to show is how one can experience medical identity theft and never truly return to the person they once were. It has been a year, this month, since my grandma had her stroke. Unlike other forms of medical identity theft, the loss of identity that comes from having a stroke can not always

Related Documents

  • Improved Essays

    Warshall V. Price Case

    • 1010 Words
    • 5 Pages

    In the Warshall v. Price case, Price only took a copy from Warshalls computer, thereby still allowing Warshall the ability to access the patient list. This argument is immaterial, however, because once Warshalls ' patients were transferred to Price, the value of the patient list was diminished, as Warshall was no longer receiving revenue from over 300 of his previous patients. In our clients case, Roderick 's business card was physically stolen by Finn leaving Roderick completely deprived of his ability to access the information on the business card. In addition, Warshall and Price had prior contacts through an employment agreement, in which they shared mutual patients. With this fact, one might argue that there was a mutual interest and right to the patient list by Price.…

    • 1010 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    In order to insure successful and systematic reaping of the bills set out, many not-for-profit hospitals erected chillingly uncharitable collection policies. According to the Cases in Healthcare Finance textbook, “not-for-profit hospitals often intimidate and harass uninsured patients through ‘goon-like and predatory collection tactics that frequently scar the patient for life…” (Ch.5, p.238). Frightening consequences awaited patients who could not, in a restricted time period, pay their inflated bill. The insurance providers would often seize a patient’s key assets like cars or threaten to foreclose on their houses, turning a minor medical procedure into a life-collapsing nightmare. Moreover, in a WSJ article published in the early 2000’s, investigative reporters concluded that the health care providers in question “did not tell the uninsured about charity care, did not offer charity care, did not discount bills to the uninsured and aggressively pursued payment”.…

    • 894 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members.” The information that was hacked included: names, date of birth, social security numbers, medical ID numbers, street and e-mail addresses, employment and income information. No medical information was stolen, so this case was not ruled by Health Insurance Portability and Accountability Act (HIPAA). The investigation revealed the hackers used the computer…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When filing electronic or personal health records online, anything is possible in regards to security breaches. Sometimes they can be avoided. Other times hackers are able to crack codes in encrypted data. When this happens, the clinic or hospital is held responsible for patients’ confidential information such as social security numbers and credit cards becoming accessible by an unauthorized third party. In July 2010, the Attorney General’s office was informed of a security breach involving at least 800,000 patients at South Shore Hospital in Massachusetts.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Patient’s information must always be protected. Health care professionals should never leave information visible for others to see. The patient’s name can be displayed only for identification purposes such as a sign-in sheet in the waiting room. As a health care provider patient’s…

    • 210 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why HIPAA Was Created

    • 946 Words
    • 4 Pages

    Every individual in an independent state or democratic practising state has the right to know and be assured that his/her medical reports/records are not going to be released to just anybody. Numerous examples and situations where HIPAA act of 1996 has been violated shows, exactly, what can happen when people’s personal information gets into the hands of a third party in an unauthorized manner. That is exactly one of the reasons medical institutions demands for official letter of recommendation from students who claims to be taking research or projects on a topic that might require that one or two patients’ medical reports be open to them, this is as a result of the fact that no one would love to walk on the street one day and be ridiculed or laughed at because of ailment that was supposed to remain unknown to anyone except the medical professional who diagnosed such patient and the patient. Also, apart from the traumatic effect that it might cause on the individual or the shame of being shamed by the public, organizations who fail to make a patient’s medical records confidential might suffer being sued and lost of public-trust once the issue becomes…

    • 946 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Deception In Healthcare

    • 85 Words
    • 1 Pages

    Deception in healthcare today is a controversial subject. Today’s society is that of the informed; in other words, the physician/healthcare provider-patient relationship today is that of cooperation, where the patient is fully informed and is a partner in his or her healthcare decisions. Additionally, society today is expected to be more knowledgeable and aware of their health which can most likely be attributed to the readily accessible medical information to the public through the internet and mass publication of continuous studies in the healthcare fields.…

    • 85 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Vulnerable Password Effect on HIPAA Introduction The University of Mississippi Medical Center suffered from multiple HIPAA violations. An unofficial visitor to their campus had stolen one of their laptops, and due to the fact that UMMC’s network was unprotected because they used a universal username and password. The active directory containing 67,000 files was exposed to danger! There was an estimation of 10,000 patients files dating back to 2008 and he optical character recognition affirms that the university failed to disclose the individuals whose ePHI was believed to have been accessed.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    The Health Insurance Portability and Accountability laws created a standard in protecting people’s health information. As people…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Fourth Amendment Privacy

    • 453 Words
    • 2 Pages

    For as long as the United State’s government has been formed, there has been the argument of how much individual privacy people deserve. Cornell University Law School states the fourth amendment as "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. " The government though presents the argument to gain access to people’s lives for safety preventing terrorism, such as the unforgettable day of September 11, 2001. Also, the government uses medical records turned in…

    • 453 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    HIPAA And Nursing Practice

    • 1098 Words
    • 5 Pages

    1. What heath care policy did you choose? Why did you choose this one? Define the policy and describe the history behind it.…

    • 1098 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    HIPAA Security and Privacy: Cases and Scenarios Brittany Stewart Herzing University Dr. Gary J. Hanney Abstract HIPAA security and privacy is an important aspect of healthcare delivery. Government influences greatly how legal issues are addressed in healthcare, including non-governmental entities. This essay will explain how the HIPAA privacy rule should be applied appropriately with protected health information.…

    • 945 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Healthcare fraud is becoming an immense problem in today’s society. When a health care provider, health suppliers, and private health companies purposely bill Medicare or Medicaid for supplies or services that were not given it is considered healthcare fraud. For example another form of fraud is when a person uses another person’s Medicare/Medicaid card…

    • 1489 Words
    • 6 Pages
    Superior Essays