Premium Essay

Medical Identity Theft

Submitted By
Words 2504
Pages 11
Introduction
Identity theft is a major problem in the United States and it is still continuing to grow. This paper will define identity theft, the problems it creates, the methods used, and will present best practices for individuals in order to encourage prevention to help fight against it. Michael Dewine, the Ohio Attorney General has defined Identity theft as “Identity theft occurs when someone obtains and uses your personal information without your permission to commit a fraud (Dewine 2016). Identity theft is a crime at both the federal and state levels because it is theft to the largest degree at wors,t and a major inconvenience as a time waster to the victim in the least. Identity theft will normally fall into one of three categories …show more content…
Medical identity theft is defined by the Department of Emergency Medicine, St. Joseph, Michigan as when someone utilizes another person’s identifying information, such as insurance policy number or social security number, without the victim’s authorization in order to gain access to medical assistance. Fraud can also be committed by using another person’s identity in order to receive payments of some type. The Federal Trade Commission estimates that approximately 249,000 people have fallen prey to medical identity theft in 2005. As a result of this crime some people may even receive the wrong types of medication or be denied service! Fixing medical identity theft can be complicated, time consuming, and costly. Consider that a reported sixty-five percent of medical identity theft victims surveyed paid more than $13,000 to resolve the crime (India Pharma News 2015). Furthermore, restriction due to compliance with the medical industry standard of privacy outline in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) will inhibit the victim from clearing up their own medical records in cases of identity theft. Clearing up cases is so difficult in fact that approximately only ten percent those surveyed state that they have gotten a thoroughly satisfactory rectification of the theft (India Pharma News 2015). Since medical identity theft does not comprise a large portion of identity theft, compared to the overall U.S. population, there are not of laws on the books which address the issue. Training medical personnel and especially the emergency room staff to recognize and avoid the allowance of identity theft is paramount in the prevention of medical identity theft. Currently, talk of biometric software in order to identify the true patients is being considered as a viable

Similar Documents

Premium Essay

Identity Theft

...head: IDENTITY THEFT: IN MORE WAYS THAN ONE Identity Theft: In More Ways than One Justin S. Evangelist CMRJ 306 D002 Criminal Investigation American Military University Identity Theft: In More Ways than One We have all watched the news; we have all heard the stories. It’s on commercials and television shows. Identity theft is sweeping across the nation and it something we should all take very seriously. Identity theft is a form of fraud or taking away someone else’s identity in order to gain something, usually financial means (Swanson, Chamelin, Territo & Taylor, 2009). The Federal Trade Commission estimates that as many as nine million Americans have their identity stole each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). There are several different forms of identity fraud, several which not everyone has heard of. The three main types of identity theft consist of criminal identity theft, medical identity theft and child identity theft. Criminal identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested (Mercuri, 2006). Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity theft...

Words: 998 - Pages: 4

Premium Essay

Identity Theft

...Identity Theft I know three people who have been affected by identity theft in the past. They were forced to deal with the hassle of clearing and repairing their good names and financial reputations. According to my research, there was a new victim of identity theft in the U.S. every two seconds within the last year and over 9 million Americans reported that their identity had been stolen (Rogers, 2014). The primary complaint on the Federal Trade Commission’s list of top consumer complaints is identity theft (Trowbridge, 2014). This crime has gone from actions like rooting through a person’s trash and stealing their mail to confidence scams to gain access to personal information. With the possibilities that are provided by the internet criminals are capable of gaining access to and stealing personal information from a larger pool of prospective victims from all across the world. What is Identity Theft? According to Merriam-Webster, identity theft is “the illegal use of someone else's personal information (as a Social Security number) especially in order to obtain money or credit” (Merriam-Webster, 2014). Some of the items that a person would utilize to steal another person’s identity are Social Security Numbers, driver's license numbers or their date of birth just to name a few of the pieces of information. The thief can take this information and use it to obtain things such as credit cards, bank accounts, auto loans, and home mortgages in the victim’s name. Some...

Words: 1134 - Pages: 5

Premium Essay

Identity Theft Via Cyberspace

...Technical Institute/NSA Black/NT1110 December 3, 2012 Identity theft is when someone uses another’s personal information without that person’s knowledge or permission to pretend to be that person. There are several types of identity theft; financial, criminal, cloning, business, medical, and synthetic, just to name a few. Identity theft has been around a long time, but it has become increasingly more prevalent in recent years due to the increased use of cyberspace. It also has become easier for thieves to operate without getting caught. Identity thieves are all around. They are like strangers we tell our kids to beware of. Anyone we come in contact with could be a potential identity thief. Every day identity thieves are planning their next theft. They use cyberspace to collect information through phishing, which is sending emails that pretend to be a legitimate business, but provide links to fake websites and ask for personal information. Also, through pharming, they send emails with viruses attached. Another way is through robot networks, these allow a hacker to take control of a computer from a remote location. Lastly, through typosquatting, when people make typing errors they land on websites that are similar to legitimate businesses, this allows thieves to infect computers (Ramaswamy, 2006). Thieves also use spyware and malware to gain information from unsuspecting people. Identity thieves steal from unsuspecting victims for financial gain. They open...

Words: 725 - Pages: 3

Premium Essay

Identity Theft Paper

...Identity Theft John Smith Concepts and Applications of Information Technology 7 April 2012 Richard Jones Identity Theft Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can damage your finances, credit history, and reputation. It can take time, money, and patience to resolve. Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. Furthermore, the internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves (Privacy and Identity). Identity thieves are resourceful. They dig through your garbage, the trash of businesses, or public dumps. They may work or pretend to work for legitimate companies, medical offices, clinics, pharmacies, or government agencies, or convince you to reveal personal information. Some thieves pretend to represent an institution you trust, and try to trick you into revealing personal information by email or phone. Some of the clues that your identity has been stolen are for example: withdrawals from your bank account that you can’t explain; don’t get your bills or other mail; debt collectors call you about debts that aren’t yours; unfamiliar accounts or charges on your credit report; medical...

Words: 908 - Pages: 4

Free Essay

Identity Theft

...Rasmussen College | Identity Theft | The long term issue | | Caden Ross | 2/17/2013 | Author's Note: This research is for Professor Rob Paixao B234/BUL2241 Section 01 Business Law Course written by Caden Ross on 02/17/2013. | Jeffrey Gerald Jackson, otherwise known as Troy Lee Evans, was arrested on September 4,2012 for identity theft. Mr. Jackson used the identity of Troy Lee Evans to gain employment at Credit Concepts Inc. Mr. Jackson had worked at Credit Concepts Inc. under this false ID for six years. Through his job there he had access to important personal information that allowed him to obtain several loans using other people's identities. Police uncovered at least six separate incidents in which Mr. Jackson used other peoples information to obtain loans for himself. His bail was set at $45,000.00 and police are asking for anyone to come forward with any additional information about other crimes he may have committed. [ (Bella, 2012) ] Identity Theft is a heinous crime with long term repercussions for it victims. Mr. Jackson's case shows how much a person can do with identity theft. He not only used other people's information to obtain loans but he lived as someone else for six years and worked as this person. This means that for six years income was reported to the IRS and Social Security as Mr. Evans when it was not his income. Any bills that Mr. Jackson has taken out in Mr. Evans name like utilities or rent can show up on Mr. Evans credit if they...

Words: 976 - Pages: 4

Premium Essay

How Identity Theft Affect the Culture of Our Society

...How Identity Theft Affect the Culture of our Society Sections I, II, III and IV Rodrekus Baskin DeVry University How Identity Fraud and Theft Impact the Culture of Our Society Section I Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how identity theft works or happens, one need to know and understand what identity theft is, the different forms of identity theft, cyber security and the impact on its victims, the methods used by identity thieves to obtain identifying information about their victims, and preventive solutions. How Identity Theft Affect the Culture of Our Society A single mother looking forward to advancing her financial situation comes across what appears to be the opportunity she has been waiting for. A real estate agent has provided her with the fortune of owning her own home and without skepticism of any impending dangers or foul play, even though he displayed what appeared to be proper credentials, she relinquished all of her personal data...

Words: 5785 - Pages: 24

Free Essay

Identity Theft

...Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011.  More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity Theft: Reducing...

Words: 1352 - Pages: 6

Free Essay

Identity Theft Research Paper

...Identity Theft Abstract This research paper will examine what is known about identity theft. The paper begins with defining the crime and its background, followed by a review of the patterns and incidences of identity theft. This review will include data on the extent and costs of this crime. Discussion will then focus on victims and perpetrators of identity theft. Common techniques used by identity thieves will be explored along with tips to protect consumers and businesses from having their identities stolen or data breached. Legislation in place to prevent and prosecute identity theft will be discussed. How to report identity theft is also explained. Defining Identity Theft The U.S. Department of Justice defines identity theft, also called identity fraud, as “all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain” (U.S. Department of Justice, 2015). Identity thieves use personal data such as Social Security numbers, bank account or credit card numbers to personally profit at the victim’s expense. These breaches allow thieves to take funds out of bank accounts or in the worst cases, take over a victim’s identity completely, running up huge debts and committing crimes using the victim’s name. Victims not only suffer the out-of-pocket financial losses, but they may have to rebuild their reputation in the community due...

Words: 4583 - Pages: 19

Free Essay

Id Theft

...IDENTITY THEFT Fraud- intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation. (1) Fraud affects individuals, businesses and the economy as a whole. Every year millions of dollars are lost due to activities of scammers using countless illegal techniques to achieve their goals. As hard as people work to make money and as difficult as it is to save it, the last thing they want to do is lose any of it through fraud. Financial fraud is the number one consumer complaint, and the biggest danger all the people face nowadays is identity theft, one of the most pervasive and insidious crimes. Identity theft occurs when someone assumes some or all of your identity to engage in criminal behavior. The first case of identity theft is described in the Bible when Jacob covered his hands and neck with goat skin in order to trick his father into giving him a blessing of a firstborn, in order to acquire all the property and livestock his father owned. In early American history, identity theft was focused on voters’ registration and ballot stuffing. Then in1930’s, brought 21’st amendment to the United States Constitution brought the new law that repealed prohibition. Alcohol was legal again, but drinking age was determined by individual state, until 1984 when US Congress passed the National Minimum Drinking Age Act. Between these times worst crime committed was underage drinking using fake ID. Usage of assumed name and identification...

Words: 2899 - Pages: 12

Free Essay

Common Data Threats and Cybercrimes

...their account settings. When employees respond, they provide their computer user name and password. Data Threat and/or Cybercrime that played a key role in the data exposure: * Phishing, Social engineering, Spyware/Adware, Uniform resource locator (URL) injectors and browser redirectors, and Viruses. Who or what the exposure affected: * Organizations that process and store sensitive data, such as government agencies, corporations, e-commerce Web sites, infrastructure organizations, like oil and gas producers and transporters, medical providers, and power plants * Anyone who is gullible, greedy, desperate, uninformed, or inexperienced. * The employees and the corporation they work for. Possible consequences: * With the employees giving out their computer user name and passwords to an unknown entity, that entity could use that information to commit the following cybercrimes: Hacking, Identity Theft, Intellectual property theft, Software piracy, Spamming, and Transmission of malware. 2. Someone attacks a university computer. He gains access to the records of over 30,000 students and staff members. These records include names,...

Words: 639 - Pages: 3

Premium Essay

Identity Theft

...Aug 26, 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses personal...

Words: 485 - Pages: 2

Premium Essay

Identity Theft Crime

...For this essay, I will go over if the government done enough to detect and deter the crime of identity theft. I will also go over how technology made identity theft easier to commit. Also for this essay, I will also go over how will emerging technologies changed the role of the cybercrime investigator. Sources used: http://www.cardhub.com/edu/identity-theft/http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.htmlhttp://www.pcworld.com/article/2453400/the-biggest-data-breaches-of-2014-so-far.htmland http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.html   The Fight Against Identity Theft Over the years people look at identity theft and say, “Oh it won’t happen to me. I don’t have a lot of money for people to want.” The thing is identity theft can happen to any with a Social Security Number, medical insurance, and any information useful to cyber criminals. Identity theft can occur when someone gains unauthorized access to someone’s personally identifying information. According to The Federal Trade Commission, there is about nine million Americans experience some form of identity theft. That number may be subjected to fluctuate because it can be consider both crime fighting tactics and methods that criminals use to steal identities over time but the FTC’s Consumer Sentinel Network received over...

Words: 606 - Pages: 3

Free Essay

Medical Id Theft

...Final Paper: Medical Identity Theft at Molina Healthcare, Inc. Barlahan, Andrei ID B00459963 Brandman University Define the Problem Medical Identity theft has become an increasing problem in the United States and continues to negatively impact millions of individuals. Medical identity theft usually occurs when individuals share their information with someone else, who in turn uses that information to receive medical services and fill for prescriptions. Other times, individuals lose their medical card or have their information stolen by a friend or close relative. According to a 2013 survey conducted by the Medical Identity Fraud Alliance (MIFA), medical identity fraud has increased nearly 20 percent compared to the year before in the U.S., affecting an estimated 1.84 victims and having a total out-of-pocket medical costs incurred by medical identity theft victims of $12.3 billion (DeGaspari, 2013). This is a serious problem, because not only are millions of dollars wasted, but patient medical records are compromised, which can result to misdiagnoses, wrong procedures and treatment, and wrong prescriptions. On a smaller scale, Molina Healthcare’s Special Investigation Unit (SIU) conduct investigations on referrals they receive indicating a Molina member may have been a victim of identity theft. A lot of times when the issue is actually identity theft, the SIU is only able to “band-aid” the problem and have found the issue resurfacing months later and Molina continuing...

Words: 3118 - Pages: 13

Free Essay

Final Rewiew

...1. Available, Integrity, and Confidentiality are the main goal of what? It security 2. Separation of Duties is the rule that requires that two or more employees must split critical task functions so that no employee knows all the stops of what? Critical task 3. Exploiting a person or system to cause harm, is called a what? vulnerability 4. Risk mitigation, risk transfer, and risk acceptance are all responses to what? risk 5. Policies are the first level of information what? governance 6. A search engine is a program that retrieves files and data from what? The internet Computer network 7. Web and logs are used by individuals as a personal online journal. They are the following words in the source of the word what? Blog 8. Privacy control implies that a person has the right to specify how his/her personally identifiable information data is what? Collected, used and shared 9. The Freedom of Information Act (1966), establishes the public’s right to request information from who? Federal agency 10. Cookie is a small string of non-executable text that a Web site stores on a user’s computer, containing information about the individuals visit to the Web site, such as what? Usernames and password 11. A natural-born U.S. citizen must be 35 years old to run for which office? president 12. Common law is a body of law developed through legal tradition and what? Court cases 13. Civil is the term for a...

Words: 464 - Pages: 2

Premium Essay

Identity Theft

...IDENTITY THEFT NAME: INSTITUTION: IDENTITY THEFT Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005). There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards or phone accounts in the names of their victims. These victims may not learn out about it for some period of time, until they notice some charges they did not make, or are contacted by a person or people claiming that they owe them. It may sometimes cost them hundreds or thousands of dollars and a lot of time while trying to undo the damage (Keith, 2005). Identity theft could ruin an otherwise spotless reputation. It could also lead to much suffering if the victims are held responsible for the thief’s actions. TYPES OF IDENTITY THEFT Identity theft can be divided into the following categories: • Criminal identity theft, that is, pretending to be another person when arrested for an offense • Child identity theft. • Financial identity theft, that is, using the identity of another...

Words: 1923 - Pages: 8