October 18, 2005 Robert S. Brown UW Medical Center Identity Theft So, what you gonna do about it?

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flag Rules: What they are? & What you need to do
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Identity Theft What you need to know Betty White, April 2010.
TCLEOSE Course No th Legislature SB – 473; SECTION 8. Section , Occupations Code, is amended by adding Subsection (i) to read as follows:
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft: FTC’s Program for Victim Assistance.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
1 Identity Theft Occurs “when the perpetrator wrongfully acquires and uses a consumer’s personal information, credit or account information.” –Used to.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Fastest Growing Crime in America. IDENTITY THEFT IS COSTING YOU BIG MONEY. 10 million people are effected by identity theft each year. More than 46 million.
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Security Awareness Identity Theft October Security Awareness. Identity Theft Someone acquires enough information about you to pose as you and.
Chapter 5 In-Class Notes. Background on Credit Types of credit: instalment and revolving open-end credit There are advantages and disadvantages to using.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Protecting Your Organization Identity Theft and Data Breach.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Identity Theft The Dangers Involved and How It Affects You!
Identity Theft:“Taking on another person’s persona for illegal purposes. Usually includes the use of Social Security.
Davis Wright Tremaine LLP Responding to Your Worst Security Breach Nightmare: When Patient Information Is Stolen Rebecca L. Williams, R.N., J.D. Partner.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Identity Theft One of America's fastest growing crimes.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
1 Identity Theft Prevention and the Red Flag Rules.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
A Bank’s Challenge to Protect Customers Sharon Vance.
IDENTITY THEFT.
Protecting Your Credit Identity
HIPAA THE PRIVACY RULE Reviewed December 2012.
Antisocial use of ICT and Computer Fraud
Protecting Your Identity:
Red Flags Rule An Introduction County College of Morris
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Presentation transcript:

October 18, 2005 Robert S. Brown UW Medical Center Identity Theft So, what you gonna do about it?

The Law RCW : No person may knowingly obtain, possess, use, or transfer a means of identification or financial information of another person, living or dead, with the intent to commit, or to aid or abet, any crime.

The Costs $53 Billion per year nationwide Loss of good will = loss of business?

The Methods Phishing has replaced dumpster diving Other methods include: – Shoulder Surfing – Skimming (data device on an ATM) – Social Engineering (think Mission: Impossible) – Mail Theft (old fashioned but it works) – Retail Theft (stealing, hacking, conning, bribing) – Plus a zillion other ways your data gets stolen

Two likely scenarios at UWMC 1. Care Recipient is an identity thief 2. Inside job (or hacker)

Care Recipient is an identity thief Duty to notify the victim – Do not share PHI unless permitted by law RCW HIPAA – Consider notifying law enforcement – Share handout explaining what you will do, what they can do (e.g. FTC’s excellent white paper) –

Care Recipient is an identity thief Need to mitigate the damage – Amend medical records – Notify internal departments – Promptly investigate & notify the victim of your findings and actions taken to fix

Employee is the Identity Thief Investigation policy? – Who is on point? – Who should you alert? – How will you summarize at conclusion? Sanction policy? – Does it explicitly address ID theft? – Will the penalties meet the Seattle Times test?

Summary Review the laws: – RCW 9.35 – HIPAA – RCW

Summary Be proactive in protecting data Be diligent about investigating Create policies now

UW Medical Center Rob Brown, Assistant Director of Compliance Ellen Rubin, RN, Privacy Officer