SlideShare a Scribd company logo
1 of 4
Download to read offline
Why It Is Important to Utilize HIPP-
compliant Medical Record Review Services
www.mosmedicalrecordreview.com 1-800-670-2809
As a personal injury attorney handling hundreds of medical records for medical
record review, you need to be extra cautious regarding the confidentiality of these
documents. More importantly, if you happen to use medical record review services, it is
your onus to make sure that they have reliable security measures in place to protect the
medical information you entrust them with, and are HIPAA-compliant. When you deal
with confidential health information, you may need to become an actual “business
associate” under HIPAA and HITECH Acts and this carries specific obligations and
compliance measures. Failing to meet the required standards may lead to serious
penalties.
Confidentiality and privacy concerns become more significant in the context of
medical identity theft that is alarmingly on the rise. An identity thief can receive medical
care and services that include medical instrumentations and prescription drugs
fraudulently using another person’s name and insurance information. Of course,
experienced attorneys help their clients hold identity thieves and other parties
accountable for their actions. However, medical identity theft creates a dangerous
situation because the notes made on the victim’s medical records will be that of the thief,
and it may lead to inappropriate and even fatal medical decisions in the future.
Let us consider why medical identity theft is increasing and what makes the medical
industry vulnerable to cybercrime.
Medical records that are shared among doctors, hospitals and other care providers are
covered by the HIPAA Act, but what about the information shared among app developers,
financial institutions and others? This is not covered by any regulation.
 Consumer Reports’ research conducted in 2015 revealed that 91% of Americans
surveyed were of the opinion that their consent should be required whenever
health information is shared.
 This shows that people are really worried about how their health information is
shared among various agencies because any careless action could lead to medical
identity theft and fraud.
 Healthcare information of patients stored on laptops, smartphones and flash drives
is very vulnerable because it can be compromised if these devices are lost or stolen.
 Studies show that medical fraud costs victims an average of $13, 500 and hundreds
of hours to set right. Worse still, how to retrieve the sensitive medical information
that is out there in the public sphere?
Why Cybercrime Is Increasing
Cybercriminals are even threatening hospitals and other healthcare facilities. Take
the recent ransomware attack against the Hollywood Presbyterian Medical Center in Los
Angeles, CA. Their computer systems were locked up by ransomware in early February. As
a result, it became impossible to carry out procedures such as CT scans and patients had
to be taken to nearby medical facilities for treatment in some cases. Access was denied to
patient data, important documents and email. The hospital paid $17,000 in bitcoins to
regain access to its data, and this was done in the best interest of restoring normal
operations, according to the president of this medical center. Healthcare insurance
providers such as Anthem and Premera Blue Cross have also been targeted by hackers,
resulting in massive breaches of PHI (Protected Health Information).
www.mosmedicalrecordreview.com 1-800-670-2809
Why do cybercriminals steal the identity of another?
 Studies by leading researchers show that these criminals steal important details
such as PHI, social security numbers, credit card information and PINs, and banking
credentials which can be sold for $1500 or even more on the black market.
 This information is used not only to obtain medical services and commit insurance
fraud, but also to create professionally forged and customized social security cards,
drivers’ licenses, passports, insurance membership cards and credit cards.
 PHI can be sold to pharmacy companies and hospitals that may want to target
patients with specific health conditions.
 Researchers say that PHI could be used even to forge passports and visas. This could
have serious consequences.
 It is found that in more than half of the identity thefts, family members are
involved. An uninsured person may use a relative’s or friend’s insurance
identification card to obtain treatment.
Medical information is very attractive to cyber thieves because it has an enduring value.
Unfortunately, for the victim this information is non-recoverable and poses a serious
threat in the hands of criminals and fraud. Their healthcare details become mixed up with
the perpetrator’s, which can have devastating consequences.
Why Steal Another’s Identity?
www.mosmedicalrecordreview.com 1-800-670-2809
Ensure PHI in Your Hands Is Protected
As mentioned at the outset, law firms and attorneys handling work that involves PHI
(medical records, lab results, insurance information etc.) for covered entities under HIPAA
come under the “business associate” classification. Therefore they also become regulated
by HIPAA and will be held liable for any violation under the Act.
 To ensure compliance, sign business associate agreements (BAA) with agencies you
partner with and who may have access to sensitive health information.
 Perform a risk assessment and have in place physical, technical and administrative
safeguards to protect against any possible data breach.
 Law firms handling such work must make sure that their outsourcing vendors such
as a medical record review company and sub-contractors also comply with the
Privacy Rule.

More Related Content

Viewers also liked

Taller d'habilitats
Taller d'habilitats Taller d'habilitats
Taller d'habilitats udmficgirona
 
How To Change The World...: The 2012 IEEE USA Meeting Keynote
How To Change The World...: The 2012 IEEE USA Meeting  KeynoteHow To Change The World...: The 2012 IEEE USA Meeting  Keynote
How To Change The World...: The 2012 IEEE USA Meeting KeynoteBlue Elephant Consulting
 
How To Give A Good Presentation -- Getting Your Audience To Listen!
How To Give A Good Presentation -- Getting Your Audience To Listen!How To Give A Good Presentation -- Getting Your Audience To Listen!
How To Give A Good Presentation -- Getting Your Audience To Listen!Blue Elephant Consulting
 
Izrada dijagrama u excel u
Izrada dijagrama u excel uIzrada dijagrama u excel u
Izrada dijagrama u excel uBranox
 
Successful Negotiating: 15 Rules For Becoming A Super Negotiator
Successful Negotiating: 15 Rules For Becoming A Super NegotiatorSuccessful Negotiating: 15 Rules For Becoming A Super Negotiator
Successful Negotiating: 15 Rules For Becoming A Super NegotiatorBlue Elephant Consulting
 

Viewers also liked (6)

Taller d'habilitats
Taller d'habilitats Taller d'habilitats
Taller d'habilitats
 
How To Change The World...: The 2012 IEEE USA Meeting Keynote
How To Change The World...: The 2012 IEEE USA Meeting  KeynoteHow To Change The World...: The 2012 IEEE USA Meeting  Keynote
How To Change The World...: The 2012 IEEE USA Meeting Keynote
 
Baumol tobin
Baumol tobinBaumol tobin
Baumol tobin
 
How To Give A Good Presentation -- Getting Your Audience To Listen!
How To Give A Good Presentation -- Getting Your Audience To Listen!How To Give A Good Presentation -- Getting Your Audience To Listen!
How To Give A Good Presentation -- Getting Your Audience To Listen!
 
Izrada dijagrama u excel u
Izrada dijagrama u excel uIzrada dijagrama u excel u
Izrada dijagrama u excel u
 
Successful Negotiating: 15 Rules For Becoming A Super Negotiator
Successful Negotiating: 15 Rules For Becoming A Super NegotiatorSuccessful Negotiating: 15 Rules For Becoming A Super Negotiator
Successful Negotiating: 15 Rules For Becoming A Super Negotiator
 

Recently uploaded

FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Recently uploaded (20)

No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

Why It Is Important to Utilize HIPP-compliant Medical Record Review Services

  • 1. Why It Is Important to Utilize HIPP- compliant Medical Record Review Services
  • 2. www.mosmedicalrecordreview.com 1-800-670-2809 As a personal injury attorney handling hundreds of medical records for medical record review, you need to be extra cautious regarding the confidentiality of these documents. More importantly, if you happen to use medical record review services, it is your onus to make sure that they have reliable security measures in place to protect the medical information you entrust them with, and are HIPAA-compliant. When you deal with confidential health information, you may need to become an actual “business associate” under HIPAA and HITECH Acts and this carries specific obligations and compliance measures. Failing to meet the required standards may lead to serious penalties. Confidentiality and privacy concerns become more significant in the context of medical identity theft that is alarmingly on the rise. An identity thief can receive medical care and services that include medical instrumentations and prescription drugs fraudulently using another person’s name and insurance information. Of course, experienced attorneys help their clients hold identity thieves and other parties accountable for their actions. However, medical identity theft creates a dangerous situation because the notes made on the victim’s medical records will be that of the thief, and it may lead to inappropriate and even fatal medical decisions in the future. Let us consider why medical identity theft is increasing and what makes the medical industry vulnerable to cybercrime. Medical records that are shared among doctors, hospitals and other care providers are covered by the HIPAA Act, but what about the information shared among app developers, financial institutions and others? This is not covered by any regulation.  Consumer Reports’ research conducted in 2015 revealed that 91% of Americans surveyed were of the opinion that their consent should be required whenever health information is shared.  This shows that people are really worried about how their health information is shared among various agencies because any careless action could lead to medical identity theft and fraud.  Healthcare information of patients stored on laptops, smartphones and flash drives is very vulnerable because it can be compromised if these devices are lost or stolen.  Studies show that medical fraud costs victims an average of $13, 500 and hundreds of hours to set right. Worse still, how to retrieve the sensitive medical information that is out there in the public sphere? Why Cybercrime Is Increasing
  • 3. Cybercriminals are even threatening hospitals and other healthcare facilities. Take the recent ransomware attack against the Hollywood Presbyterian Medical Center in Los Angeles, CA. Their computer systems were locked up by ransomware in early February. As a result, it became impossible to carry out procedures such as CT scans and patients had to be taken to nearby medical facilities for treatment in some cases. Access was denied to patient data, important documents and email. The hospital paid $17,000 in bitcoins to regain access to its data, and this was done in the best interest of restoring normal operations, according to the president of this medical center. Healthcare insurance providers such as Anthem and Premera Blue Cross have also been targeted by hackers, resulting in massive breaches of PHI (Protected Health Information). www.mosmedicalrecordreview.com 1-800-670-2809 Why do cybercriminals steal the identity of another?  Studies by leading researchers show that these criminals steal important details such as PHI, social security numbers, credit card information and PINs, and banking credentials which can be sold for $1500 or even more on the black market.  This information is used not only to obtain medical services and commit insurance fraud, but also to create professionally forged and customized social security cards, drivers’ licenses, passports, insurance membership cards and credit cards.  PHI can be sold to pharmacy companies and hospitals that may want to target patients with specific health conditions.  Researchers say that PHI could be used even to forge passports and visas. This could have serious consequences.  It is found that in more than half of the identity thefts, family members are involved. An uninsured person may use a relative’s or friend’s insurance identification card to obtain treatment. Medical information is very attractive to cyber thieves because it has an enduring value. Unfortunately, for the victim this information is non-recoverable and poses a serious threat in the hands of criminals and fraud. Their healthcare details become mixed up with the perpetrator’s, which can have devastating consequences. Why Steal Another’s Identity?
  • 4. www.mosmedicalrecordreview.com 1-800-670-2809 Ensure PHI in Your Hands Is Protected As mentioned at the outset, law firms and attorneys handling work that involves PHI (medical records, lab results, insurance information etc.) for covered entities under HIPAA come under the “business associate” classification. Therefore they also become regulated by HIPAA and will be held liable for any violation under the Act.  To ensure compliance, sign business associate agreements (BAA) with agencies you partner with and who may have access to sensitive health information.  Perform a risk assessment and have in place physical, technical and administrative safeguards to protect against any possible data breach.  Law firms handling such work must make sure that their outsourcing vendors such as a medical record review company and sub-contractors also comply with the Privacy Rule.