{"id":574,"date":"2018-05-14T15:47:55","date_gmt":"2018-05-14T22:47:55","guid":{"rendered":"https:\/\/fueldev.site\/~ascentbl\/?p=574"},"modified":"2018-12-31T10:55:55","modified_gmt":"2018-12-31T18:55:55","slug":"protecting-patients-identity-theft","status":"publish","type":"post","link":"https:\/\/ascentblog.org\/protecting-patients-identity-theft\/","title":{"rendered":"Protecting Your Patients from Identity Theft"},"content":{"rendered":"
Identity theft is a frequent news topic nowadays. While most horror stories center around banking transactions and credit card fraud, the health care industry isn\u2019t immune from the problem, either. Protecting your patients from identity theft will help instill trust in your practice and show that you take their privacy concerns seriously. It\u2019s an important part of doing business in this day and age.<\/p>\n
How does medical identity theft occur?<\/strong><\/p>\n The Federal Trade Commission (FTC) says medical identity theft occurs most frequently when an individual uses another person\u2019s insurance information to obtain and\/or pay for medical treatment, prescription drugs or surgery. Alternatively, employees in a medical practice might submit false claims using a patient\u2019s information in order to receive payment. Identity theft is a concern not just for patients but for health care providers and insurers, as well, especially in an era where HIPAA privacy protections are so rigidly enforced.<\/p>\n How does a patient know when they have been the victim of medical identity theft? Some of the telltale signs include:<\/p>\n Patients who experience one or more of these things should contact their insurance provider immediately, as well as your practice. Once you receive a complaint of possible medical identity theft, there are steps you should take to help resolve the issue and ensure no further breaches of security occur.<\/p>\n What should my practice do to help a victim of medical identity theft?<\/strong><\/p>\n Once you have been notified by a patient about possible medical identity theft, you should take steps right away to help combat the problem.<\/p>\n First off, launch an investigation. This begins with a review of your patient\u2019s records in order to determine whether they have, in fact, been billed erroneously for services never received. If the information is substantiated, notify all parties with access to the patient\u2019s medical or billing records, and ask those responsible to correct the inconsistencies. If your investigation reveals that the theft originated in your practice, consult the HIPAA Breach Notification Rule (45 CFR part 164 subpart D) to determine whether a breach occurred, and provide any notifications that are required. Finally, conduct a thorough review of your practice\u2019s security protocol, even if your clinic is not responsible. Experts recommend periodic reviews of your security measures in order to minimize the risk of a future breach.<\/p>\n There is no 100 percent surefire way to prevent medical identity theft from occurring. But careful scrutiny of your practice\u2019s security policies, stringent employee screening and training, and providing educational materials for your patients \u2013 the FTC\u2019s Medical Identity Theft<\/em> brochure is an excellent informational guide \u2013 will go a long way toward minimizing your risk and keeping your patients\u2019 information safe.<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" Identity theft is a frequent news topic nowadays. While most horror stories center around banking transactions and credit card fraud, the health care industry isn\u2019t immune from the problem, either. Protecting your patients from identity theft will help instill trust in your practice and show that you take their privacy concerns seriously. It\u2019s an important…<\/p>\n","protected":false},"author":3,"featured_media":575,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"schema":"","placeID":"","no_match":false,"name":"","company":"","review":"","address":"","city":"","state":"","zip":"","lat":"","lng":"","phone1":"","phone2":"","fax":"","mon1":"","mon2":"","tue1":"","tue2":"","wed1":"","wed2":"","thu1":"","thu2":"","fri1":"","fri2":"","sat1":"","sat2":"","sun1":"","sun2":"","hours-note":"","footnotes":""},"categories":[7,6],"tags":[],"class_list":["post-574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitaltechnology","category-practice-advice"],"yoast_head":"\n\n