SlideShare a Scribd company logo
How	
  to	
  Protect	
  Your	
  Healthcare	
  Facility	
  From	
  Medical	
  Identity	
  Theft	
  
	
  
Albany	
  Medical	
  Center	
  was	
  working	
  
hard	
  to	
  take	
  care	
  of	
  its	
  patients	
  and	
  
bring	
  a	
  higher	
  level	
  of	
  healthcare	
  to	
  
the	
  community.	
  According	
  to	
  most	
  
patients,	
  the	
  facility	
  was	
  doing	
  a	
  
good	
  job	
  of	
  it.	
  	
  
	
  
Unfortunately,	
  the	
  medical	
  center’s	
  
reputation	
  was	
  recently	
  damaged	
  
when	
  one	
  of	
  its	
  own	
  nurses	
  was	
  
caught	
  stealing	
  patient	
  identities.	
  
With	
  the	
  help	
  of	
  her	
  boyfriend,	
  a	
  
nurse	
  stole	
  over	
  50	
  patient	
  
identities	
  and	
  applied	
  for	
  hundreds	
  
of	
  credit	
  cards	
  in	
  their	
  names.	
  The	
  
two	
  identity	
  thieves	
  were	
  
eventually	
  caught	
  red-­‐handed	
  with	
  
a	
  collection	
  of	
  patients’	
  names,	
  home	
  addresses,	
  Social	
  Security	
  numbers,	
  credit	
  cards,	
  and	
  
gift	
  cards.	
  	
  	
  
	
  
Sadly,	
  this	
  is	
  just	
  one	
  of	
  numerous	
  cases	
  in	
  which	
  nurses	
  swiped	
  patient	
  identities	
  for	
  
personal	
  financial	
  gain.	
  As	
  a	
  medical	
  facility	
  or	
  administrator,	
  it’s	
  your	
  duty	
  to	
  protect	
  your	
  
patients	
  from	
  identity	
  theft.	
  After	
  all,	
  more	
  importantly	
  than	
  harming	
  your	
  reputation	
  as	
  a	
  
trusted	
  healthcare	
  provider,	
  medical	
  identity	
  theft	
  puts	
  your	
  patients’	
  lives	
  at	
  risk.	
  Here’s	
  how	
  
to	
  safeguard	
  your	
  facility.	
  	
  
	
  
Be	
  Strict	
  About	
  Hiring	
  
Implement	
  well-­‐defined	
  hiring	
  practices	
  to	
  weed	
  out	
  potential	
  threats.	
  For	
  example,	
  run	
  
extensive	
  background	
  checks	
  on	
  each	
  applicant	
  to	
  make	
  sure	
  there	
  is	
  no	
  history	
  of	
  criminal	
  
activity	
  or	
  association	
  with	
  criminals.	
  Also,	
  only	
  hire	
  personnel	
  that	
  can	
  show	
  their	
  
qualifications	
  and	
  have	
  a	
  long	
  list	
  of	
  references—references	
  you	
  actually	
  check	
  up	
  on	
  as	
  well.	
  
Reference	
  checks	
  are	
  important	
  for	
  every	
  position,	
  but	
  especially	
  for	
  the	
  nurses	
  who	
  will	
  have	
  
regular	
  interaction	
  with	
  patients	
  and	
  their	
  private	
  information.	
  
	
  
Stick	
  to	
  Regulations	
  
Your	
  patients	
  are	
  at	
  risk	
  every	
  time	
  employees	
  don’t	
  explicitly	
  follow	
  established	
  protocols	
  
and	
  federal	
  privacy	
  regulations.	
  This,	
  of	
  course,	
  includes	
  adhering	
  to	
  the	
  rules	
  governing	
  
protected	
  health	
  information	
  under	
  HIPAA.	
  Patient	
  records	
  are	
  a	
  goldmine	
  for	
  identity	
  
thieves.	
  They	
  contain	
  all	
  of	
  the	
  information	
  they	
  need	
  to	
  easily	
  commit	
  medical	
  identity	
  
theft—names,	
  addresses,	
  birthdates,	
  and	
  Social	
  Security	
  numbers.	
  Patient	
  files	
  may	
  even	
  
include	
  credit	
  card	
  information	
  for	
  billing	
  purposes.	
  Make	
  sure	
  you	
  follow	
  all	
  of	
  HIPAA’s	
  strict	
  
guidelines	
  for	
  how	
  patient	
  information	
  should	
  be	
  handled	
  to	
  reduce	
  the	
  likelihood	
  of	
  that	
  
data	
  falling	
  into	
  the	
  wrong	
  hands.	
  	
  
	
  
Implement	
  Control	
  Systems	
  
Set	
  up	
  control	
  systems	
  to	
  eliminate	
  opportunities	
  for	
  medical	
  identity	
  theft	
  to	
  occur	
  at	
  your	
  
facility.	
  This	
  includes	
  considering	
  both	
  human	
  and	
  electronic	
  security	
  measures.	
  Create	
  an	
  
extensive	
  set	
  of	
  policies	
  and	
  procedures	
  that	
  safeguard	
  patients’	
  personal	
  information:	
  	
  
	
  
• Hire	
  an	
  identity	
  theft	
  protection	
  company	
  that	
  specializes	
  in	
  not	
  only	
  preventing	
  
medical	
  identity	
  theft	
  from	
  happening	
  in	
  the	
  first	
  place,	
  but	
  also	
  recovering	
  patient	
  
identities	
  after	
  they’re	
  stolen.	
  
• Develop	
  a	
  secure	
  IT	
  network	
  that	
  only	
  allows	
  authorized	
  users	
  to	
  access	
  patient	
  
records.	
  Require	
  complex	
  passwords	
  to	
  login	
  to	
  the	
  network,	
  and	
  only	
  share	
  them	
  with	
  
those	
  employees	
  who	
  need	
  access.	
  
• Configure	
  computer	
  systems	
  containing	
  patient	
  records	
  to	
  automatically	
  logout	
  a	
  user	
  
when	
  a	
  workstation	
  is	
  unattended.	
  
• Add	
  security	
  screens	
  to	
  computers	
  in	
  public	
  areas.	
  
• Hold	
  all	
  members	
  of	
  your	
  staff	
  accountable	
  for	
  complying	
  with	
  HIPAA	
  laws.	
  
• Require	
  staff	
  to	
  participate	
  in	
  annual	
  competency	
  training	
  to	
  keep	
  their	
  patient	
  privacy	
  
skills	
  up-­‐to-­‐date.	
  
• Never	
  leave	
  patient	
  records	
  unattended	
  in	
  unsecured	
  areas.	
  
• Regularly	
  shred	
  and	
  securely	
  dispose	
  of	
  printed	
  patient	
  records.	
  
• Audit	
  your	
  system	
  regularly	
  to	
  see	
  which	
  records	
  have	
  been	
  accessed	
  and	
  by	
  whom.	
  If	
  
you	
  notice	
  patient	
  records	
  have	
  been	
  accessed	
  after	
  hours	
  or	
  have	
  been	
  accessed	
  
repeatedly,	
  call	
  those	
  employees	
  in	
  to	
  question.	
  	
  
• If	
  resources	
  allow	
  for	
  it,	
  hire	
  a	
  full-­‐time	
  privacy	
  and	
  security	
  officer	
  responsible	
  for	
  
monitoring,	
  tracking,	
  and	
  protecting	
  patient	
  privacy.	
  
	
  
	
  
Prevent	
  Medical	
  Identity	
  Theft	
  
If	
  your	
  system	
  is	
  breached	
  and	
  patient	
  identities	
  are	
  stolen,	
  hire	
  a	
  professional	
  identity	
  theft	
  
investigator	
  to	
  run	
  the	
  investigation.	
  They	
  stay	
  current	
  on	
  all	
  of	
  the	
  latest	
  medical	
  identity	
  
theft	
  methods,	
  and	
  use	
  techniques	
  to	
  quickly	
  find	
  the	
  identity	
  thieves.	
  The	
  last	
  thing	
  you	
  want	
  
to	
  do	
  is	
  let	
  the	
  identity	
  theft	
  drag	
  on,	
  putting	
  more	
  patients	
  in	
  harm’s	
  way.	
  
	
  
Ultimately,	
  as	
  a	
  reputable	
  medical	
  facility,	
  you	
  have	
  a	
  responsibility	
  to	
  keep	
  your	
  patients’	
  
identities	
  under	
  lock	
  and	
  key.	
  Failure	
  to	
  do	
  so	
  not	
  only	
  threatens	
  patients’	
  health	
  and	
  
finances.	
  Identity	
  theft	
  also	
  has	
  far-­‐reaching	
  legal	
  and	
  financial	
  implications	
  that	
  can	
  put	
  you	
  
out	
  of	
  business.	
  
	
  
Don’t	
  let	
  identity	
  thieves—whether	
  employees	
  or	
  people	
  outside	
  the	
  organization—wreak	
  
havoc	
  in	
  your	
  medical	
  facility.	
  Visit	
  www.TheIdentityAdvocate.com	
  for	
  more	
  tips	
  and	
  to	
  learn	
  
how	
  to	
  set	
  up	
  a	
  medical	
  identity	
  theft	
  protection	
  plan	
  for	
  your	
  business.	
  
	
  

More Related Content

What's hot

Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplacesalvarez63
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
Ashley Valenzuela
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevblk70130
 
Confidentiality, security, and integrity of information
Confidentiality, security, and integrity of informationConfidentiality, security, and integrity of information
Confidentiality, security, and integrity of informationsmallwoods
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
AMSIMM9932
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
ndejesus4
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacysawanda
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcarekmasterson
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentialityljbroshious
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
Kelly Snyder
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
bernardsanch
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slidewongy12
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
Meg Oser
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
Rhonda Williams
 
Protected health information
Protected health informationProtected health information
Protected health information
miszkeeta
 
Identity theft: Could it happen in your office?
Identity theft: Could it happen in your office?Identity theft: Could it happen in your office?
Identity theft: Could it happen in your office?
- Mark - Fullbright
 

What's hot (19)

Confidentiality in the Workplace
Confidentiality in the WorkplaceConfidentiality in the Workplace
Confidentiality in the Workplace
 
Hippa training 2017
Hippa training 2017Hippa training 2017
Hippa training 2017
 
Healthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bevHealthcare confidentiality training.2013bev
Healthcare confidentiality training.2013bev
 
Confidentiality, security, and integrity of information
Confidentiality, security, and integrity of informationConfidentiality, security, and integrity of information
Confidentiality, security, and integrity of information
 
Patient confidentiality MHA 690
Patient confidentiality MHA 690Patient confidentiality MHA 690
Patient confidentiality MHA 690
 
Confidentiality Training
Confidentiality TrainingConfidentiality Training
Confidentiality Training
 
Health care confidentiality and privacy
Health care confidentiality and privacyHealth care confidentiality and privacy
Health care confidentiality and privacy
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Healthcare Confidentiality
Healthcare ConfidentialityHealthcare Confidentiality
Healthcare Confidentiality
 
Mha wk 1 dis 2
Mha wk 1 dis 2Mha wk 1 dis 2
Mha wk 1 dis 2
 
HIPAA
HIPAA HIPAA
HIPAA
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Patients’ privacy and confidentiality
Patients’ privacy and confidentialityPatients’ privacy and confidentiality
Patients’ privacy and confidentiality
 
Confidentiality slide
Confidentiality slideConfidentiality slide
Confidentiality slide
 
HIPAA INSERVICE 2017
HIPAA INSERVICE 2017 HIPAA INSERVICE 2017
HIPAA INSERVICE 2017
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Confidentiality
Confidentiality Confidentiality
Confidentiality
 
Protected health information
Protected health informationProtected health information
Protected health information
 
Identity theft: Could it happen in your office?
Identity theft: Could it happen in your office?Identity theft: Could it happen in your office?
Identity theft: Could it happen in your office?
 

Viewers also liked

Unit 7
Unit 7Unit 7
Kt gurumurthy
Kt gurumurthyKt gurumurthy
Kt gurumurthy
Dr.Gurumurthy K T
 
Communication and meeting design - EIBTM14
Communication and meeting design - EIBTM14Communication and meeting design - EIBTM14
Communication and meeting design - EIBTM14
myQaa
 
Model pemberdayaan kode etik dan etika profesi
Model pemberdayaan kode etik dan etika profesiModel pemberdayaan kode etik dan etika profesi
Model pemberdayaan kode etik dan etika profesiIka Probowati
 
Aplikasi
AplikasiAplikasi
Aplikasi
Taq Wa
 
Accidents de plongée 2016: Reconnaissance et prise en charge
Accidents de plongée 2016: Reconnaissance et prise en charge Accidents de plongée 2016: Reconnaissance et prise en charge
Accidents de plongée 2016: Reconnaissance et prise en charge
Islem Soualhi
 
Ottimizzatore di tensione news
Ottimizzatore di tensione newsOttimizzatore di tensione news
Ottimizzatore di tensione newsElio Pellegrino
 
модели гоу до-1
модели гоу до-1модели гоу до-1
модели гоу до-1
Екатерина Шепелева
 
What do you_know_about_the_usa
What do you_know_about_the_usaWhat do you_know_about_the_usa
What do you_know_about_the_usaAntshil
 
english reading skill by mati khan ahmadzai
english reading skill by mati khan ahmadzaienglish reading skill by mati khan ahmadzai
english reading skill by mati khan ahmadzai
Mati Khan Ahmadzai
 
Communication 2
Communication 2Communication 2
Communication 2
Samina Haider
 
What does Loufest mean to you?
What does Loufest mean to you?What does Loufest mean to you?
What does Loufest mean to you?
seandula
 
Pkn status warga negara(rahman wahyu)
Pkn status warga negara(rahman wahyu)Pkn status warga negara(rahman wahyu)
Pkn status warga negara(rahman wahyu)
rahmanwahyu1998
 

Viewers also liked (16)

Unit 7
Unit 7Unit 7
Unit 7
 
Kt gurumurthy
Kt gurumurthyKt gurumurthy
Kt gurumurthy
 
Communication and meeting design - EIBTM14
Communication and meeting design - EIBTM14Communication and meeting design - EIBTM14
Communication and meeting design - EIBTM14
 
N system physics
N system physicsN system physics
N system physics
 
Model pemberdayaan kode etik dan etika profesi
Model pemberdayaan kode etik dan etika profesiModel pemberdayaan kode etik dan etika profesi
Model pemberdayaan kode etik dan etika profesi
 
Aplikasi
AplikasiAplikasi
Aplikasi
 
Николай Тесла
Николай ТеслаНиколай Тесла
Николай Тесла
 
Accidents de plongée 2016: Reconnaissance et prise en charge
Accidents de plongée 2016: Reconnaissance et prise en charge Accidents de plongée 2016: Reconnaissance et prise en charge
Accidents de plongée 2016: Reconnaissance et prise en charge
 
Ottimizzatore di tensione news
Ottimizzatore di tensione newsOttimizzatore di tensione news
Ottimizzatore di tensione news
 
модели гоу до-1
модели гоу до-1модели гоу до-1
модели гоу до-1
 
ความเป็นมาของคอมพิมเตอร์
ความเป็นมาของคอมพิมเตอร์ความเป็นมาของคอมพิมเตอร์
ความเป็นมาของคอมพิมเตอร์
 
What do you_know_about_the_usa
What do you_know_about_the_usaWhat do you_know_about_the_usa
What do you_know_about_the_usa
 
english reading skill by mati khan ahmadzai
english reading skill by mati khan ahmadzaienglish reading skill by mati khan ahmadzai
english reading skill by mati khan ahmadzai
 
Communication 2
Communication 2Communication 2
Communication 2
 
What does Loufest mean to you?
What does Loufest mean to you?What does Loufest mean to you?
What does Loufest mean to you?
 
Pkn status warga negara(rahman wahyu)
Pkn status warga negara(rahman wahyu)Pkn status warga negara(rahman wahyu)
Pkn status warga negara(rahman wahyu)
 

Similar to How to Protect Your Healthcare Facility From Medical Identity Theft

Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
RightPatient®
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And Privacy
Scott Fikes
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
Springfield Clinic
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
Health 2Conf
 
Hi103 week 5 chpt 13
Hi103 week 5 chpt 13Hi103 week 5 chpt 13
Hi103 week 5 chpt 13
BealCollegeOnline
 
MHA 690-Confidentiality
MHA 690-ConfidentialityMHA 690-Confidentiality
MHA 690-Confidentiality
suzettedavis
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
kmcanty
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
TravisDC4
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Complete feasibility report
Complete feasibility reportComplete feasibility report
Complete feasibility report
Sharon Nemecek
 
Discussion2
Discussion2 Discussion2
Discussion2
amberlinn
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
Lajpat Rai
 
medi-lynx letterhead
medi-lynx letterheadmedi-lynx letterhead
medi-lynx letterheadAndre Bayards
 
Medical Identity Theft - What you Need to Know
Medical Identity Theft - What you Need to KnowMedical Identity Theft - What you Need to Know
Medical Identity Theft - What you Need to Know
RightPatient®
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staffsawanda
 
Hippa
HippaHippa

Similar to How to Protect Your Healthcare Facility From Medical Identity Theft (20)

Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
 
Mha690 w1 d2
Mha690 w1 d2Mha690 w1 d2
Mha690 w1 d2
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And Privacy
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 
Hi103 week 5 chpt 13
Hi103 week 5 chpt 13Hi103 week 5 chpt 13
Hi103 week 5 chpt 13
 
MHA 690-Confidentiality
MHA 690-ConfidentialityMHA 690-Confidentiality
MHA 690-Confidentiality
 
Hippa final JU nursing informatics
Hippa final JU nursing informaticsHippa final JU nursing informatics
Hippa final JU nursing informatics
 
HIPAA
HIPAAHIPAA
HIPAA
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Complete feasibility report
Complete feasibility reportComplete feasibility report
Complete feasibility report
 
Discussion2
Discussion2 Discussion2
Discussion2
 
Ethical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health CareEthical And Legal Aspects Of Health Care
Ethical And Legal Aspects Of Health Care
 
medi-lynx letterhead
medi-lynx letterheadmedi-lynx letterhead
medi-lynx letterhead
 
Medical Identity Theft - What you Need to Know
Medical Identity Theft - What you Need to KnowMedical Identity Theft - What you Need to Know
Medical Identity Theft - What you Need to Know
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Mha690week,discussion 2
Mha690week,discussion 2Mha690week,discussion 2
Mha690week,discussion 2
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staff
 
Hippa
HippaHippa
Hippa
 

Recently uploaded

Introduction to Forensic Pathology course
Introduction to Forensic Pathology courseIntroduction to Forensic Pathology course
Introduction to Forensic Pathology course
fprxsqvnz5
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
rajkumar669520
 
ICH Guidelines for Pharmacovigilance.pdf
ICH Guidelines for Pharmacovigilance.pdfICH Guidelines for Pharmacovigilance.pdf
ICH Guidelines for Pharmacovigilance.pdf
NEHA GUPTA
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
pchutichetpong
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
Aboud Health Group
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
ILC- UK
 
Health Education on prevention of hypertension
Health Education on prevention of hypertensionHealth Education on prevention of hypertension
Health Education on prevention of hypertension
Radhika kulvi
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
Ahmed Elmi
 
Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
Iris Thiele Isip-Tan
 
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondEmpowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Health Catalyst
 
Essential Metrics for Palliative Care Management
Essential Metrics for Palliative Care ManagementEssential Metrics for Palliative Care Management
Essential Metrics for Palliative Care Management
Care Coordinations
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cell
 
Jaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICE
Jaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICEJaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICE
Jaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICE
ranishasharma67
 
Nursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.pptNursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.ppt
Rommel Luis III Israel
 
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
o6ov5dqmf
 
HEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptxHEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptx
priyabhojwani1200
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Guillermo Rivera
 
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxBOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
AnushriSrivastav
 
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
Ameena Kadar
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
The Harvest Clinic
 

Recently uploaded (20)

Introduction to Forensic Pathology course
Introduction to Forensic Pathology courseIntroduction to Forensic Pathology course
Introduction to Forensic Pathology course
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
ICH Guidelines for Pharmacovigilance.pdf
ICH Guidelines for Pharmacovigilance.pdfICH Guidelines for Pharmacovigilance.pdf
ICH Guidelines for Pharmacovigilance.pdf
 
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...Medical Technology Tackles New Health Care Demand - Research Report - March 2...
Medical Technology Tackles New Health Care Demand - Research Report - March 2...
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
 
Health Education on prevention of hypertension
Health Education on prevention of hypertensionHealth Education on prevention of hypertension
Health Education on prevention of hypertension
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
 
Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
 
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondEmpowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
Empowering ACOs: Leveraging Quality Management Tools for MIPS and Beyond
 
Essential Metrics for Palliative Care Management
Essential Metrics for Palliative Care ManagementEssential Metrics for Palliative Care Management
Essential Metrics for Palliative Care Management
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
 
Jaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICE
Jaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICEJaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICE
Jaipur ❤cALL gIRLS 89O1183002 ❤ℂall Girls IN JaiPuR ESCORT SERVICE
 
Nursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.pptNursing Care of Client With Acute And Chronic Renal Failure.ppt
Nursing Care of Client With Acute And Chronic Renal Failure.ppt
 
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
 
HEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptxHEAT WAVE presented by priya bhojwani..pptx
HEAT WAVE presented by priya bhojwani..pptx
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
 
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptxBOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
BOWEL ELIMINATION BY ANUSHRI SRIVASTAVA.pptx
 
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......POLYCYSTIC OVARIAN SYNDROME (PCOS)......
POLYCYSTIC OVARIAN SYNDROME (PCOS)......
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
 

How to Protect Your Healthcare Facility From Medical Identity Theft

  • 1. How  to  Protect  Your  Healthcare  Facility  From  Medical  Identity  Theft     Albany  Medical  Center  was  working   hard  to  take  care  of  its  patients  and   bring  a  higher  level  of  healthcare  to   the  community.  According  to  most   patients,  the  facility  was  doing  a   good  job  of  it.       Unfortunately,  the  medical  center’s   reputation  was  recently  damaged   when  one  of  its  own  nurses  was   caught  stealing  patient  identities.   With  the  help  of  her  boyfriend,  a   nurse  stole  over  50  patient   identities  and  applied  for  hundreds   of  credit  cards  in  their  names.  The   two  identity  thieves  were   eventually  caught  red-­‐handed  with   a  collection  of  patients’  names,  home  addresses,  Social  Security  numbers,  credit  cards,  and   gift  cards.         Sadly,  this  is  just  one  of  numerous  cases  in  which  nurses  swiped  patient  identities  for   personal  financial  gain.  As  a  medical  facility  or  administrator,  it’s  your  duty  to  protect  your   patients  from  identity  theft.  After  all,  more  importantly  than  harming  your  reputation  as  a   trusted  healthcare  provider,  medical  identity  theft  puts  your  patients’  lives  at  risk.  Here’s  how   to  safeguard  your  facility.       Be  Strict  About  Hiring   Implement  well-­‐defined  hiring  practices  to  weed  out  potential  threats.  For  example,  run   extensive  background  checks  on  each  applicant  to  make  sure  there  is  no  history  of  criminal   activity  or  association  with  criminals.  Also,  only  hire  personnel  that  can  show  their   qualifications  and  have  a  long  list  of  references—references  you  actually  check  up  on  as  well.   Reference  checks  are  important  for  every  position,  but  especially  for  the  nurses  who  will  have   regular  interaction  with  patients  and  their  private  information.    
  • 2. Stick  to  Regulations   Your  patients  are  at  risk  every  time  employees  don’t  explicitly  follow  established  protocols   and  federal  privacy  regulations.  This,  of  course,  includes  adhering  to  the  rules  governing   protected  health  information  under  HIPAA.  Patient  records  are  a  goldmine  for  identity   thieves.  They  contain  all  of  the  information  they  need  to  easily  commit  medical  identity   theft—names,  addresses,  birthdates,  and  Social  Security  numbers.  Patient  files  may  even   include  credit  card  information  for  billing  purposes.  Make  sure  you  follow  all  of  HIPAA’s  strict   guidelines  for  how  patient  information  should  be  handled  to  reduce  the  likelihood  of  that   data  falling  into  the  wrong  hands.       Implement  Control  Systems   Set  up  control  systems  to  eliminate  opportunities  for  medical  identity  theft  to  occur  at  your   facility.  This  includes  considering  both  human  and  electronic  security  measures.  Create  an   extensive  set  of  policies  and  procedures  that  safeguard  patients’  personal  information:       • Hire  an  identity  theft  protection  company  that  specializes  in  not  only  preventing   medical  identity  theft  from  happening  in  the  first  place,  but  also  recovering  patient   identities  after  they’re  stolen.   • Develop  a  secure  IT  network  that  only  allows  authorized  users  to  access  patient   records.  Require  complex  passwords  to  login  to  the  network,  and  only  share  them  with   those  employees  who  need  access.   • Configure  computer  systems  containing  patient  records  to  automatically  logout  a  user   when  a  workstation  is  unattended.   • Add  security  screens  to  computers  in  public  areas.   • Hold  all  members  of  your  staff  accountable  for  complying  with  HIPAA  laws.   • Require  staff  to  participate  in  annual  competency  training  to  keep  their  patient  privacy   skills  up-­‐to-­‐date.   • Never  leave  patient  records  unattended  in  unsecured  areas.   • Regularly  shred  and  securely  dispose  of  printed  patient  records.   • Audit  your  system  regularly  to  see  which  records  have  been  accessed  and  by  whom.  If   you  notice  patient  records  have  been  accessed  after  hours  or  have  been  accessed   repeatedly,  call  those  employees  in  to  question.     • If  resources  allow  for  it,  hire  a  full-­‐time  privacy  and  security  officer  responsible  for   monitoring,  tracking,  and  protecting  patient  privacy.      
  • 3. Prevent  Medical  Identity  Theft   If  your  system  is  breached  and  patient  identities  are  stolen,  hire  a  professional  identity  theft   investigator  to  run  the  investigation.  They  stay  current  on  all  of  the  latest  medical  identity   theft  methods,  and  use  techniques  to  quickly  find  the  identity  thieves.  The  last  thing  you  want   to  do  is  let  the  identity  theft  drag  on,  putting  more  patients  in  harm’s  way.     Ultimately,  as  a  reputable  medical  facility,  you  have  a  responsibility  to  keep  your  patients’   identities  under  lock  and  key.  Failure  to  do  so  not  only  threatens  patients’  health  and   finances.  Identity  theft  also  has  far-­‐reaching  legal  and  financial  implications  that  can  put  you   out  of  business.     Don’t  let  identity  thieves—whether  employees  or  people  outside  the  organization—wreak   havoc  in  your  medical  facility.  Visit  www.TheIdentityAdvocate.com  for  more  tips  and  to  learn   how  to  set  up  a  medical  identity  theft  protection  plan  for  your  business.