Preview

Fraud and Abuse

Good Essays
Open Document
Open Document
953 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fraud and Abuse
LaPreaa Vann
March 25, 2013
“To Catch a Thief”

The article “To Catch A Thief” is written to inform individuals about the different down falls of being a victim of identity theft. Experts believe that medical identity theft is increasing and now with all new technology it is hard to detect the costs of thieves. Taking people’s medical identity does not just affect that person it has a huge effect on the health care billing system. They are charged millions of dollars because of an incident. Studies show that ninety six percent of hospitals reported one data breach in two years. This shows that the average cost of data breaches rose and will continue to rise depending on how many theft incidents will occur in a time period. Data breaches also roll over into hospitals, which means it will run them around twelve billion dollars. The medical industries are not well up dated on detecting and preventing identity theft. Which is not a good thing; they should have the ability to be informed on what is going on with patient’s medical records. They are held responsible and no one will trust them if the rates of medical identity theft continue to rise. It is very costly to everybody and the costs are not affordable at all. There are different types of medical thefts, such as the ones that steal identities to get a hold to the use of prescription provided drugs. The thief can do a lot with those prescriptions such as sell them and or use them to a deadly extent. This is an extreme problem if a person is not prescribed to a certain drug that cannot be store bought they should not have any contact or hold to them period. That’s taking away from the patients who really are in need of the medicine. Usually if this kind of incident happens then the nine times out of ten the victim knows the thief. Any kind of medical theft is facing fraud. There are many other consequences they have to face at different ranges. In all they could be caught and held accountable for the

You May Also Find These Documents Helpful

  • Powerful Essays

    The proposed social health insurance system will implement a smart card system to easily transfer health information data between providers. Each individual covered by a health insurance fund will have a personalized smart card with basic information: photo identification, state, name, address, and birthdate on the face of the card. The card will have a barcode for providers to scan to allow them to access all of an individual’s information relating to their medical history and basic identification information. The smart cards’ information will be accessible in every health care system database across the nation, and the system will be maintained by the federal government. Providers will have personalized logins and passwords to access the database and the medical information of every individuals to ensure security and privacy of patient information. The smart cards will allow health care providers to transfer data, scans, and imaging to other providers in different parts of the country more quickly and efficiently. These cards will reduce the cost of shipping scans, wait time for individuals, and improve quality outcomes by improving the transparency and flow of health care. If an individual loses their smart card or does not have their card accessible when receiving medical care, providers can look up an individual’s information in the database by social…

    • 5252 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Case Study for Fraud

    • 996 Words
    • 4 Pages

    The amount listed is the enrollment agreement was 10,020.00 which gives a difference of :…

    • 996 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Medical identity theft is just as devastating patients as financial issues are. This type of theft is defined as the fraudulent acquisition of another person’s personal information - such as their name, Social Security number, or health insurance number - for unlawfully obtaining such items as prescription drugs or devices, or medical services (Ollove, 2014). Insurance reimbursements obtained illegally are also considered medical identity theft. According to one survey completed by the Identity Theft Resource Center, 43 percent of all identity theft is medical-related identity theft (Ollove, 2014). Under the Health Information Technology for Economic and Clinical Health Act (HITECH Act), all medical providers must notify patients and HHS when a breach of patient medical records is found. Unlike financial identity theft, it is nearly impossible to separate the thief’s medical information from the victim’s information because of the fear of medical liability (Ollove, 2014). If some information about the patient is missing and a mis-diagnosis occurs, then the chance of a malpractice lawsuit…

    • 1089 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Hi, Jodi. Very informative post. Organizations such as Columbia University Medical Center and New York-Presbyterian Hospital need to be more vigilant in safeguarding patient’s information. According to a study conducted by BitSight Technology, they reported that medical records sold on the black market cost $20 each (Desjardins, 2014). This is easy cash for cyber bandits. Moreover, these bandits easily retrieve medical records due to errors that can be easily ameliorated. Errors result due to health organizations being the new kid on the block where data protection is concerned. However, they can learn from pros in the industry such as retail businesses and banks. Additional errors result from organizations not implementing stringent security…

    • 383 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Fraud

    • 1250 Words
    • 5 Pages

    The main suspects at this time are Ben Hill, Michelle Shelton, Candie Harris, Sam MacCarty, and Phil Ackers. The red flags in this case deal primarily with a lack in segregation of duties. These suspects all juggle multiple roles, some of which are not listed in their job description. Some of these suspects actively seek out additional responsibilities and place themselves in roles where they probably do not belong. Further rationalization for choosing these suspects is outlined below.…

    • 1250 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Bank Fraud

    • 2619 Words
    • 7 Pages

    White collar crime is a defined as a crime committed by an individual of high spcial ranking, that receives alot of repsect in the comunity, the term coined by socialogist Sutherland. Over the years this descriptio of white collar crime has been contested and now covers a range of crimes. One in particular is counterfeit. This can happen a number of ways, one that is becoming more common is counterfeit money scams and committing fraud towards a financial institution. One of the most recent cases of counterfeiting is the the ring of five men that circulated six million dollars worth in the money market. I come across this crime on regular basis at work. I work as a deposit loss prevention analyst at a bank here in Norman. My coworker wonder why people deposit counterfeit checks into the bank and commit fraud on our clients accounts. I say people commit this crime becuase they feel they need the money and lack the drive to go out and earn the money themselves. This concept sounds all too familiar. This concept I described can be explained by Merton’s Strain theory. Throughout this essay I will describe the processes of bank scams and counterfeit in the bank. Do not confuesed, this essay is not to teach you how to be succesful at committing fraud at a bank or scamming a bank. This sole purpose is to give an inside look on white collar bank scams and the theory of why the crime is committed and how to prevent it.…

    • 2619 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    criminology unit 4

    • 593 Words
    • 3 Pages

    An additional form of identity theft occurs when someone uses a person’s name for the benefit of medical services. Medical identity theft can be life threatening, since decisions by medical doctors and staff is made based on the existing conditions of the victim. A certain specific form of medical identity theft is physician identity theft. Physician identity theft occurs when a person illegally uses a physician’s name and physician identification number for prescribing unnecessary prescriptions.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Financial Abuse

    • 766 Words
    • 4 Pages

    He also withdrew more than £116,000 in cash, spent around £170,000 on Crabb, and transferred his £640,000 farmhouse and most of the remaining land into Crabb's name, leaving the rest to her in his will.As the couple used £90,000 to redecorate the farmhouse, Mr Cooper lived in squalid conditions in a disused tack room next door.The trial heard he had longed for a woman to move in and take care of him and some of his neighbours knew he was vulnerable.Crabb and…

    • 766 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Billing Fraud

    • 1005 Words
    • 5 Pages

    What is Medical Billing Fraud? It is an attempt to fraudulently obtain payments from insurance carriers. Medicare and Medicaid are the most susceptible to fraud because of their payment arrangements. Fraud in medical billing cost tax payers and medical providers millions of dollars annually. In 1996, HIPPA established the Health Care Fraud and Abuse Control Program (HCFAC) to help combat medical billing and health care fraud. Fraud is an act done with the knowledge that you are doing wrong.…

    • 1005 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Healthcare Fraud and Abuse

    • 3106 Words
    • 13 Pages

    Rising costs of healthcare is a valid concern for many households in America. A factor in the cost of healthcare insurance is fraud. Fraud is often very difficult to detect. The magnitude of healthcare fraud is unknown. Initial reimbursement and payment and billing timeframe of 90 days allows for fast payment of services, however, many times before there is an indication of fraudulent billing the company has closed up and moved on. Fraud in American healthcare, costs American’s millions perhaps even billions of dollars annually. Without doubt, behind every act of fraud lies a lapse in ethics. This paper will review several pieces of literature to look regarding healthcare fraud. It will discuss the different kinds of fraud, legislation used to combat fraud, a few settled cases, and lastly discuss ways to help to combat healthcare fraud.…

    • 3106 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Modern Healthcare. (2010, June 28). The new fraud offensive; It 's time to sto losing billions to fraud each year and redirect those dollars. . United States of America. Retrieved from www.lexisnexis.com/hottopics/Inacademic…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Improving Patient Care

    • 1537 Words
    • 7 Pages

    Shultz, D. (2012) As Patients ' Records Go Digital, Theft and Hacking Problems Grow. www.kaiserhealthnews.org…

    • 1537 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Welfare Fraud

    • 1648 Words
    • 7 Pages

    I can remember the conversation as if it was yesterday. While in a grocery store walking in the grocery aisle, I overheard a woman talking to another woman and her husband. The part that caught my attention was the young lady saying, “I can get you the cheese, milk, and eggs with my WIC, and all you have to do is give me the money when we leave the store.” I knew this wasn’t right, so I made sure I was at the check-out counter to see if what I overheard was true. To my surprise, the young woman paid for things using a check like piece of paper and waited for the couple to leave the store. In the parking lot, I witnessed the young lady giving the couple the bags that she left the store with and they handed her some cash. For this and many other reasons I would like to propose that people that receive this state appointed assistance should have a time limit on how much they can receive.…

    • 1648 Words
    • 7 Pages
    Better Essays
  • Best Essays

    References: Author Unknown. Breach Report 2010, Redspin Inc. Dec. 2010. Retrieved from http://www.redspin.com/resources/whitepapers-datasheets/index.php on April 19, 2012. Badzek, L., Gross, G. Confidentiality and Privacy: At the Forefront for Nurses. The American Journal of Nursing, Vol. 99, No. 6 (June, 1999), pp.52-54. Lippincott Williams & Wilkins. Retrieved April 18, 2012 from http://www.jstor.org/stable/3472150. Byfield, E. 315,000 Patients ' Information Disappears From Emory Healthcare. WSBTV. Retrieved April 18, 2012 from file:///F:/Ethics%20information%20age/315,000%20patients%27%20information%20disappears%20from%20Emory%20Healthcare%20_%20www.wsbtv.com.htm Dixon, P. MEDICAL IDENTITY THEFT: The Information Crime that Can Kill You, March 3, 2006. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/pdf/wpf_medicalidtheft2006.pdf on April 24, 2012. Foreman, Judy (26 June 2006). "At Risk of Exposure”. Los Angeles Times. Retrieved April 23 , 2012. Gellman, R. Fact Sheet 8a: HIPAA Basics: Medical Privacy in the Electronic Age. Privacy Clearing House. March, 2012. Retrieved April 19, 2012 from http://www.privacyrights.org/fs/fs8a-hipaa.htm. Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. § 1320d-9 (2010).…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Better Essays

    In the world of technology today, consumers often purchase items through the internet using their personal information such as name, date of birth and credit card numbers. This information can easily be stolen from someone who seeks to exploit weakness in a computer network. According, to (Gagne, 2012), “data breaches often occur through technical vulnerabilities, malware, compromised user credentials or opportunist attackers”. Healthcare organizations maintain patient medical and personal information through an electronic source called the electronic health record. Healthcare quality and safety requires that the right information be available at the right time to support patient care and health system management decisions. Data breaches in healthcare have become common within the last few years which is a violation of the Health Insurance Portability Accountability Act of 1996 and patient privacy. Data security is a major concern pertaining to consumers choosing a health care organization to fit their needs. Care providers and insurance companies face the increased enforcement of regulatory requirements to ensure patients of their personal information secure. The key steps to achieving data security in healthcare organizations is to following policies and procedure, conduct audit trails, data classification, data protection, encryption and disaster recovery/business continuity.…

    • 1491 Words
    • 4 Pages
    Better Essays

Related Topics