PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE

Slides:



Advertisements
Similar presentations
Red Flag Rules: What they are? & What you need to do
Advertisements

© Chery F. Kendrick & Kendrick Technical Services.
+ HEALTH INSURANCE: UNDERSTANDING YOUR COVERAGE Navigator Name Blank County Extension UGA Health Navigators.
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
NAU HIPAA Awareness Training
HIPAA Health Insurance Portability and Accountability Act 1.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
1 Identity Theft and Phishing: What You Need to Know.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
PRIORITIES. AARP Tax-Aide Priorities BudgetsTraining E-Filing Reimbursements Security Accuracy Developing Leaders CertificationDonations Recruitment.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up © 2009.
Confidential – Do Not Distribute Iris Biometrics For Accurate Patient Identification Michael Trader President M2SYS Technology
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
What Can YOU Do to Help Prevent Healthcare Fraud? Sponsored by: Idaho Commission on Aging Senior Medicare Patrol Program Presented by: (Presenter name,
© Chery F. Kendrick & Kendrick Technical Services.
Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Identity theft By: Blake D uncan.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Wireless Access Code: July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Medicare & Medi-Cal Fraud Information and Prevention.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Best Identity Protection
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Jeff loses his identity! Lesson 8: Identity Theft.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
“Medical Identity Theft” February 9th 2016
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
1 Identity Theft Prevention and the Red Flag Rules.
Jeff loses his identity! Lesson 5: Identity Theft.
Protecting Your Assets By Preventing Identity Theft
Add video notes to lecture
Identity Theft Austin Tyler Ramsey.
And the finer details of patient privacy
By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard
Stovall and Klee Security
Tax Identity Theft Presenter Date
When you get caught for Identity Theft
By: Johnathan Rowse, Jacob Palmer, Kayla Morgan, Paige Frasier
Protecting Your Identity:
Protecting Your Credit
Indiana Senior Medicare Patrol (SMP)
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Jeff loses his identity!
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Cybersecurity and Personal Finance
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Protecting Your Identity
Clemson University Red Flags Rule Training
Identity Theft By Omer Ersen.
Cybercrime By: Kimberly Foreiter
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE Matt Kalina

2,000,000+ Patients are impacted by medical identity theft Over Half a Million more from 2013

68 BILLION DOLLARS Over 10 BILLION more from 2013

DUPLICATES 10.4% of records are problematic duplicates 10-12% of Records in a hospital are duplicates

BROKEN TRUST 56% of patients lose trust in their healthcare providers as a result of medical identity theft 56% of patients lose trust in their Healthcare Provider

REASONS FOR MEDICAL IDENTITY THEFT • Move to Electronic Health Records • Minimal set protocols to protect patients If your credit card is stolen, it may take a few minutes on the phone with the bank to reverse the fraudulent charges. But if your identity is stolen and used for medical treatment, it could take a year or longer to undo the damage. Victims may also get dropped by their insurance provider and end up paying the imposter’s bills just to make the problem go away, potentially to the tune of $100,000 or more. How big of a problem is it?

MAIN ISSUES OF MEDICAL FRAUD PATIENTS: Lack Awareness Costly Life Threatening HOSPITALS: Costly Hurt Reputation Time & Energy to Fix Brief synopsis and will dive into each later in the presentation. Let’s go through a few examples of real world Medical Fraud that has happened.

CURRENT PRACTICES TO PREVENT FRAUD PHOTO ID DoB First Name Last Name Address SSN HIPAA Protected Health Info (PHI) Security & Privacy RED FLAGS RULE Credit Card Info SSN/Employee Insurance Claim Background Checks Review Soft Characteristics of current practices Behind the scenes protocols put in place with HIPAA and the new Red Flags Rule in 2010. So with many protective protocols and procedures in place to protect from Fraud HOW is this happening still and why is it a growing trend?

WHY CURRENT PRACTICES DON’T WORK Not positively identifying the patients at the point of registration Patients are faking who they say they are and getting away with it never to be heard from again leaving chaos behind. So what is the New Age way to prevent Medical Fraud from occurring?

HOW DID THE MEDICAL IDENTITY THEFT HAPPEN? Review the first 5 reasons Family Members taking info without knowledge – extremely easy to do and the already know all the information about the patient Shared info willingly with friends – harder to eliminate when patients know but if set protocols were set to catch this from happening they wouldn’t be able to share Don’t know – most likely it was stolen without their knowledge by friends, family, or thieves online Mistake online – thieves are getting smarter (Personal story about me in Charlevoix) Data Breach – more and more common with cyber attacks and EHRs as you can see by the graph

24% A FAMILY MEMBER TOOK PERSONAL IDENTIFICATION OR MEDICAL CREDENTIALS WITHOUT MY CONSENT

23% I SHARED MY PERSONAL IDENTIFICATION OR MEDICAL CREDENTIALS WITH SOMEONE I KNOW

15% DON’T KNOW

12% BY MISTAKE I GAVE MY PERSONAL INFORMATION TO A FAKE EMAIL OR SPOOFED WEBSITE

10% MY HEALTHCARE PROVIDER OR INSURER HAD A DATA BREACH

WHY WAS YOUR MEDICAL IDENTITY STOLEN? Let’s take a step back and see why Medical Identity Fraud is occuring in the first place. Review the 1st three main reasons Why medical ID is stolen in the first place No Benefits themselves Drug Abuse

59% TO OBTAIN HEALTHCARE SERVICES & TREATMENT Let’s take a step back and see why Medical Identity Fraud is occuring in the first place. Review the 1st three main reasons Why medical ID is stolen in the first place No Benefits themselves Drug Abuse

56% TO OBTAIN PRESCRIPTION PHARMACEUTICALS Let’s take a step back and see why Medical Identity Fraud is occuring in the first place. Review the 1st three main reasons Why medical ID is stolen in the first place No Benefits themselves Drug Abuse

7 BEST PRACTICES TO PREVENT MEDICAL IDENTITY THEFT

1 ALWAYS ASK FOR TWO PIECES OF IDENTIFICATION AT REGISTRATION.

2 LOOK FOR INCONSISTENCIES IN THE PATIENT RECORD.

3 WHEN IN DOUBT, NOTIFY MEDICAL RECORDS AND CREATE A TEMPORARY JON/JANE DOE RECORD.

4 BUILD AWARENESS OF MEDICAL IDENTITY THEFT AS A QUALITY-OF-CARE ISSUE.

5 DON’T USE PATIENTS’ SOCIAL SECURITY NUMBER FOR IDENTIFICATION PURPOSES. Soft Identifier – you need a unique identifier or hard identifier to make sure the patient is exactly who they say they are

6 USE FRAUD DETECTION SOFTWARE TO PREVENT AND MONITOR SUSPICIOUS ACTIVITY.

NEW TREND TOWARDS BIOMETRICS New trend towards Biometrics. With a unique identifier such as Iris Scanning, Palm Scanning and fingerprint technology it will be impossible for anyone to commit fraud again even family members. This also will help deter Fraud from occurring in the first place since you cannot fake a fingerprint or palm scan. This Prevents fraud from happening and protects the patient information so no one else can use their medical benefits.

7 THINGS TO KEEP IN MIND WHEN RESEARCHING BIOMETRICS

1 PATIENT AND STAFF ACCEPTANCE.

2 EASE OF USE BY REGISTRATION STAFF.

3 RELIABILITY OF BIOMETRIC HARDWARE.

4 HIPAA COMPLIANCE

5 ACCURACY OF BIOMETRIC MATCHES

6 COMMERCIAL AVAILABILITY AND COST OF THE HARDWARE/SOFTWARE PACKAGE

7 ABILITY TO INSTANTLY VERIFY AGAINST MULTIPLE DATABASES

Review Map of Ohio and why the 2 counties went down

CONCLUSION Fraud is a growing issue Effects patients and hospitals negatively Solutions to help prevent and restore Thank everyone for listening Dismiss to lunch

44k patients die every year due to Medical Errors which are directly cooralated to Medical Identity Fraud and duplicate Medical records. Here’s an example of someone thankfully catching the medical error, otherwise it could have killed him.