Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

Medical Identity Theft – Examples

Posted on January 25, 2017 by Jean Eaton in Blog

Medical Identity theft is one of the fastest growing areas of organized crime.

It can affect individuals:

  • Financial and credit.
  • Inaccurate information added to your medical record.
  • Extortion of your personal health information.
  • False information can threaten your family or your employment.

It can affect health service providers:

  • Stolen identities of health service providers is used to set up fake clinics in their names and bill against stolen patient identities.

[clickToTweet tweet=”Prevent #MedicalIdentityTheft. Here's how.” quote=”Preventing medical identity theft starts by clinics asking to see picture ID from their patients.”]

  • Helps to reduce medication errors in healthcare.
  • Avoid providing services to fraudulent patients – ask for picture ID when you register a patient.
  • Improve your technical safeguards – budget for electronic data security investment.
  • Become aware of the risks and educate your staff.

Information Managers offers Privacy Awareness training on-site, group public workshops, and webinars. Don't miss an event – see Upcoming Events.

For more examples of how medical identity theft may impact your office, listen to the Health Care Technology Online Newsletter podcast

identity theft, medical identity theft, privacy

Would You Know if There Were Two of You?

Posted on January 24, 2016 by Jean Eaton in Blog

Identity theft is a growing problem but there are things that you can do to protect yourself.

Identity theft happens when someone steals your personal information and uses it without your permission – to make purchases, take out loans, get medical services – and more! Victims can end up with drained bank accounts, destroyed credit, and the enormous task of fixing the problem. The pieces of personal information that can be used to commit identity theft include:your name, Social Insurance Number, birth date, mother's maiden name, credit report, driver's license, and credit card and bank account numbers. It doesn’t take much to create a new identity – often just 3 pieces of information.


Tip: Answer 10 questions about your online activities to calculate your personal identity risk score. (EMC
2/RSA). Discover how your online activities – from banking and shopping to the types of social networking sites you visit – may potentially make you more vulnerable to identity theft and fraud. Try the Online Identity Risk Calculator.

Identity Theft and Identity Fraud – RCMP YouTube Channel

The RCMP recommends these steps if you think you are a victim of identity theft or fraud:

  • Step 1 – Contact your local police force and file a report.
  • Step 2 – Contact your bank/financial institution and credit card company
  • Step 3 – Contact the two national credit bureaus and place a fraud alert on your credit reports.
    • Equifax Canada
      Toll free: 1-800-465-7166
    • TransUnion Canada
      Toll free: 1-877-525-3823
  • Step 4 – Always report identity theft and fraud. Contact the Canadian Anti-Fraud Centre

Tip – Be aware and be secure with your personally identifying information.

Illustration from Privacy Commissioner of Canada, www.priv.gc.ca

Illustration from Privacy Commissioner of Canada, www.priv.gc.ca

Instructions

  • Set up a schedule to review your credit card and bank statements – monthly, quarterly – and always have a ballpark in mind of your spending history
  • Once you've reviewed your statements, make sure that you've shredded the paper documents that you no longer need (and keep them in a secure place while you do need them!) By shredding your bank and credit card statements, you can prevent thieves from “dumpster-diving” for the easy information.
  • Set up a Google Alert for your name, business name, and other key identifiers.  You will receive a listing of whenever your name appears in the internet.
  • Limit the amount of personal information that you share on-line, in stores, and on the forms that you fill out.  Ask why they need your information.
  • Install and update anti-virus and malware protection software on your smartphone. Malware and viruses can access and steal personal information, which can lead to identity theft. ‪

Identity theft can happen at work, too.

Waël Hassan notes in his LinkedIn Post, ‘Hacking LinkedIn: The Risk Every HR Department Should Be Talking About’ is the risk of social engineering or spear phishing hacking threats. To prevent this, Hassan recommends three steps that HR departments or managers can do to reduce the risk of spear phishing.

Establish a social media policy, or even a specific policy for business networking and job search sites. Your social media policy should establish that corporate email accounts are not to be used to create or validate social media accounts. It should also specify types of corporate information that should not be published on social media, such as project details, budgets, team members, and technologies used on the job.

Provide employees with instructions on what to do and who to consult if they suspect they have been victims of identity theft. Employees need to know that they will be met with empathy and support if this happens to them.

Review processes for documenting, reporting, and investigating cases of identity theft.

These recommendations make good business sense, too! After all, privacy is good for business.

Resources

EMC2/RSA, Online Identity Risk Calculator 

RCMP  Identity Theft and Identity Fraud, 2015-12-04

Waël Hassan. “Phishing Hacking LinkedIn The Risk Every HR Department Should be Talking About“, LinkedIn, Jan 6 2016.

 

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

 

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

 

#PrivacyAware, Data Privacy Day, identity theft, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Search the site

What is the elephant in the room?

The Elephant in the Room Find out here...

Privacy Policy

“This was my first ever time I had to work on a PIA and I was a little nervous about doing it efficiently - but you really made it as simple and straight forward as possible. Thank you for being available for my questions when I had them. I would easily recommend Privacy Impact Assessments to Protect Your Practice course for anyone to do their own PIA's! Thank you so much!”

- Karen Sarabura, Clinic Manager and Privacy Officer, CGA Medical Imaging, Alberta

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2022 Information Managers Ltd.