What is Medical Identity Theft?
Medical Identity Theft Concerns on the RiseAs medical providers seek to move from cumbersome paper records to smaller and easier to file and trace electronic records, the concern over medical identity theft is escalating.
The sheer size of files limits the amount of paper medical records that are likely to be stolen. But several thousand electronic records can fit on a portable hard drive, which is only the size of a cell phone. The stolen records then can be used by the fraudster or sold on the black market to people who 'need' them.
That could lead to many more cases like the one in which a Houston man who had never had any health issues received a bill for thousands of dollars of emergency medical services, as reported in the New York Times. A fraudster had used the man’s identity for the fraudster’s emergency medical needs.
Medical identity theft is dangerous not only from a financial perspective as in the case above, but from a medical one as well. If someone has successfully stolen a person’s identity and received treatment, the record can become part of a patient's permanent medical record.
For example, a patient could be unconscious after an accident. The emergency room reads that during a previous admission the 'patient' indicated he or she is not allergic to the medication the doctor believes will be most beneficial for the unconscious patient. Relying on the prior medical record, the doctor administers that drug which – in reality – the patient is severely allergic to.
According to a 2008 Identity Theft Resource Center survey, some of the reasons that medical identity theft is particularly damaging to victims include:
Roughly a third of victims of medical ID theft surveyed had someone else's medical information or medical history on their medical record, increasing the possibility of patients being treated incorrectly because of incorrect medical records.
More than 10 percent of victims of medical ID theft surveyed were denied health or life insurance for unexplained reasons.
More than two-thirds of victims surveyed receive a bill for medical services that were provided to an imposter.
ModernHealthcare.com reported recently that officials at Massachusetts General Hospital had seen a noticeable spike in attempted medical identity theft. This follows the trend of other health care organizations. For example, in June of 2008 the University of Utah Hospital announced the personal information of 2.2 million patients had been stolen.
The World Privacy Forum estimates that there are more than 250,000 cases of medical identity theft each year. The World Privacy Forum, which published an extensive report on medical identity theft in 2006 (a new report is due out later this year), acknowledges that medical identity theft is a crime that can cause great harm to its victims. Yet despite the profound risk it carries, it is the least studied and most poorly documented of the cluster of identity theft crimes.
The World Privacy Forum recommends the following steps for people to protect themselves against medical identity theft:
Closely monitor any "Explanation of Benefits" sent by a public or private health insurer
Pro-actively request a listing of benefits from your health insurers
Request a copy of current medical files from each health care provider
If any of those reports indicates that a person has been a victim of medical identity theft, the World Privacy Forum recommends take the following actions:
File a police report
Correct erroneous and false information in the file
Keep an eye on reports from each of the three credit reporting bureaus
Request an accounting of disclosures
|Key Terms To Understanding Card Skimming Card Skimming:|
Related Articles on Webopedia:
Based in Colorado, Rob Douglas is an identity theft expert and has been fighting against fraud and cyber crime for more than a decade. He is the editor of www.IdentityTheft.info and a speaker at identity theft conferences across the USA.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »List of Well-Known TCP Port Numbers
Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of port numbers are specified in... Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »