Combating The Privacy Crime That Can Kill

Slides:



Advertisements
Similar presentations
The Hidden Costs of Identity Theft on American Business.
Advertisements

Part I: Making Good Online Choices
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Lesson 8.5 Identity Theft July 2011Copyright © … REMTECH, inc … All Rights Reserved1 Introduction Identity theft occurs when someone steals some.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Cleanup © 2012.
Identity Theft Stefany K. Watson Brandon K. Mosley.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Electronic Transaction Use & Risk of Identity Theft.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Identity theft By: Blake D uncan.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Cleanup.
Protecting Seniors Against Financial Abuse Jane Rooney, Financial Literacy Leader Edmonton Financial Elder Abuse Roundtable April 23, 2015.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Identity Theft.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Kelly Herd Rebecca Hofeling IDENTITY THEFT AND PROTECTION Communication 2500.
Identity Theft The Nation’s Fastest Growing Crime.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Jeff loses his identity! Lesson 8: Identity Theft.
“Health Care Fraud” 18USC, Ch. 63, Sec Whoever knowingly and willfully executes, or attempts to execute, a scheme or artifice— 1. To defraud any.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Identity Theft One of America's fastest growing crimes.
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Identity Theft Project By: Timmy Townsend And Eric Fields.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
TYLER GROUP
Medicaid & Food Stamp Fraud Penalties in New York City.
A Bank’s Challenge to Protect Customers Sharon Vance.
Identity Theft It’s a crime!
Small Business and Personal Credit
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
“Health Care Fraud” 18USC, Ch. 63, Sec. 1347
Teen Violence The sad reality.
Women in the U.S. Report Highest Rates of Not Getting Needed Care Because of Cost Percent of women ages 19–64 who experienced any access problem because.
Percent of adults ages 19– In the past 12 months:
Clemson University Red Flags Rule Training
Chapter 1: Information Security Fundamentals
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Financial Abuse - 7 Minute Briefing
Financial Abuse - 7 Minute Briefing
Your Credit and the Law Chapter 27 5/24/2019.
Reasons for Not Enrolling in October Included Uncertainty over Affordability, Still Deciding Among Plans, and Website Technical Difficulties Can you tell.
When Low-Income Adults Have a Medical Home and Insurance, Their Rates of Having Cost-Related Access Problems Decline Percent of adults ages 19–64 with.
Identity Theft: What if You Are a Victim?
Identity Theft By Omer Ersen.
The Number of Adults Reporting Not Getting Needed Care Because of Cost Declined in 2014 for the First Time Since 2003 Percent of adults ages 19–
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Combating The Privacy Crime That Can Kill HITSS It Out of the Park 9 April 2015

Case History Examples of Identity theft Medical Identity Theft: Recommendations for the Age of Electronic Medical Records -California Attorney General Kamala D. Harris

Harris: “The move to electronic medical records provides an opportunity to address this serious quality-of-care issue….There are lessons to be learned from other industries that have experience in detecting and responding to fraud in electronic transactions.”

How Medical ID Theft Happens Consensual Individual gives personal information to an acquaintance in order to receive care, goods, or services. 30 percent of all ID theft victims admit to sharing personal information with someone they knew. Expected to decline as ACA extends insurance to uninsured individuals.

How Medical ID Theft Happens Unknown to the victim Very often from industry insiders Sometimes from strangers via normal ID theft routes Organized crime statistics

Impact/Potential Impact Still the Same Inflict financial harm Quality of Care Incorrect history Incorrect diagnosis Incorrect treatment Dire consequences regardless if the crime was committed by a friend or a stranger

Difficulties with detection Ponemon Institute: approximately 1.84 million victims in 2013. How many people actually read their statement of benefits? Timeliness?