0

The crime of identity theft existed long before the information age and electronic records. Forgery is an old example of using another person’s identity to commit a crime, usually financial fraud. As the Internet and electronic records have grown in use and popularity, more and more people store important identity and financial information on networked computers. Using networked computers provides significant improvement to the ease and efficiency of using and providing financial services. Today, almost all financial services may be performed online at any time, day or night. However, the increased online handling of financial information has also resulted in a significant increase in identity theft. Lafferty (2007) explains, “that financial identity theft is on the rise and ranks as one of the top consumer fraud complaints in the nation according to the FTC” (p. 12). The same efficiency benefits that allow consumers and financial services providers to increase their productivity also apply to identity thieves, who can steal thousands of identities at a time instead of tens.

In 2004, President Bush issued an executive order mandating the implementation of nationwide electronic health records (p. 15).  Just as traditional identity theft existed prior to electronic financial records and just as having financial data online increases the impact of risks associated with identity theft, the implementation of electronic health records brings increased risks of medical identity theft. Lafferty describes medical identity theft as, “both an information (i.e., identity theft) and health care (i.e., fraud and abuse) crime that results in financial, medical, and other harms to its victims” (p. 13).

Both identity theft and medical identity theft have significant negative impacts for the victims. Since the victim’s identity has been stolen, the process of establishing that the victim did not actually complete the financial transactions is lengthy and difficult. Holtfreter and Holtfreter (2006) present a case study of an identity theft victim that required, “close to a year and thousands of dollars to cover her losses and restore her excellent credit history” (p. 57). The victims of medical identity theft face similar financial challenges. In addition, medical identity theft can also have potentially life-threatening results. Imagine a case where a criminal commits medical identity theft that results in a victim’s record showing a diagnosis of diabetes. In an emergency, medical workers utilizing those records might administer insulin, which can be fatal to non-diabetics. As Lafferty states,

Without doubt the most significant harm that results from medical identity theft is when health care providers unknowingly base their medical decisions in treating a victim on inaccurate information from the thief’s medical history. The harm caused by false entries in a victim’s medical history is compounded because the entries are shared with a multitude of other health care providers, creating a significant risk of future harm (p. 13).

In addition, medical identity theft results in similar financial harms to victims as traditional identity theft, with insurance limits charged to their maximums.

As with identity theft, insiders most often perpetrate medical identity theft, with access to the records. Criminal penalties exist for both identity theft and medical identity theft. The Fair and Accurate Credit Transactions Act of 2003 and the Identity Theft Penalty Act of 2004 provide penalties for identity theft and aggravated identity theft respectively (Holtfreter and Holtfreter, 2006). These laws and regulations relating to identity theft also pertain to medical identity theft. In addition the Health Insurance Portability and Accountability Act provides penalties for those who commit crimes that violate the privacy of medical records (Lafferty, 2007). The Privacy Rights and Oversight for Electronic and Commercial Transactions Act of 2006, “was introduced [in 2007] with the intent of “empowering consumers and giving them a say in how companies buy, sell, and market their private data, while entitling them to effective security protections,” including a patient’s bill of rights (Lafferty, p. 18).

Identity theft and medical identity theft are insidious crimes that are growing in frequency and result in lasting financial, reputational, and medical consequences. Businesses that process, transmit, or in any way handle financial and medical identity information must take steps to ensure that the risks associated with these data types are mitigated. For businesses to succeed at these daunting efforts, the National Institute of Standards and Technology recommends implementing an enterprise risk management framework to ensure, “a disciplined, structured, extensible, and repeatable process for achieving risk-based protection related to the operation and use of information systems and the protection of EPHI” (Scholl, Stine, Hash, Bowen, Johnson, Smith, and Steinberg, 2008).

References

Holtfreter, R. E., & Holtfreter, K. (2006). Gauging the effectiveness of US identity theft legislation. Journal of Financial Crime, 13(1), 56. Retrieved from http://proquest.umi.com.library.capella.edu/pqdweb?did=994688151&Fmt=7&clientId=62763&RQT=309&VName=PQD

Lafferty, L. “. T. “. (2007). Medical identity theft: The future threat of health care fraud is now. Journal of Health Care Compliance, 9(1), 11-20. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=23843738&site=ehost-live&scope=site

Scholl, M., Stine, K., Hash, J., Bowen, P., Johnson, A., Smith, C. D., Steinberg, D. I. (2008). “NIST SP 800-66 – Revision 1 – An Introductory Resource Guide for Implementing the HIPAA Security Rule”, Computer Security Division, Information Technology Laboratory (ITL), National Institute of Standards and Technology, October 2008.

Comments are closed.

PHVsPjxsaT48c3Ryb25nPndvb19hZHNfcm90YXRlPC9zdHJvbmc+IC0gZmFsc2U8L2xpPjxsaT48c3Ryb25nPndvb19hZF9jb250ZW50X2Fkc2Vuc2U8L3N0cm9uZz4gLSA8L2xpPjxsaT48c3Ryb25nPndvb19hZF9jb250ZW50X2Rpc2FibGU8L3N0cm9uZz4gLSB0cnVlPC9saT48bGk+PHN0cm9uZz53b29fYWRfY29udGVudF9pbWFnZTwvc3Ryb25nPiAtIGh0dHA6Ly93d3cud29vdGhlbWVzLmNvbS9hZHMvd29vdGhlbWVzLTQ2OHg2MC0yLmdpZjwvbGk+PGxpPjxzdHJvbmc+d29vX2FkX2NvbnRlbnRfdXJsPC9zdHJvbmc+IC0gaHR0cDovL3d3dy53b290aGVtZXMuY29tPC9saT48bGk+PHN0cm9uZz53b29fYWRfaW1hZ2VfMTwvc3Ryb25nPiAtIGh0dHA6Ly93d3cud29vdGhlbWVzLmNvbS9hZHMvd29vdGhlbWVzLTEyNXgxMjUtMS5naWY8L2xpPjxsaT48c3Ryb25nPndvb19hZF9pbWFnZV8yPC9zdHJvbmc+IC0gaHR0cDovL3d3dy53b290aGVtZXMuY29tL2Fkcy93b290aGVtZXMtMTI1eDEyNS0yLmdpZjwvbGk+PGxpPjxzdHJvbmc+d29vX2FkX2ltYWdlXzM8L3N0cm9uZz4gLSBodHRwOi8vd3d3Lndvb3RoZW1lcy5jb20vYWRzL3dvb3RoZW1lcy0xMjV4MTI1LTMuZ2lmPC9saT48bGk+PHN0cm9uZz53b29fYWRfaW1hZ2VfNDwvc3Ryb25nPiAtIGh0dHA6Ly93d3cud29vdGhlbWVzLmNvbS9hZHMvd29vdGhlbWVzLTEyNXgxMjUtNC5naWY8L2xpPjxsaT48c3Ryb25nPndvb19hZF91cmxfMTwvc3Ryb25nPiAtIGh0dHA6Ly93d3cud29vdGhlbWVzLmNvbTwvbGk+PGxpPjxzdHJvbmc+d29vX2FkX3VybF8yPC9zdHJvbmc+IC0gaHR0cDovL3d3dy53b290aGVtZXMuY29tPC9saT48bGk+PHN0cm9uZz53b29fYWRfdXJsXzM8L3N0cm9uZz4gLSBodHRwOi8vd3d3Lndvb3RoZW1lcy5jb208L2xpPjxsaT48c3Ryb25nPndvb19hZF91cmxfNDwvc3Ryb25nPiAtIGh0dHA6Ly93d3cud29vdGhlbWVzLmNvbTwvbGk+PGxpPjxzdHJvbmc+d29vX2FsdF9zdHlsZXNoZWV0PC9zdHJvbmc+IC0gYmx1ZXllbGxvdy5jc3M8L2xpPjxsaT48c3Ryb25nPndvb19hdXRvX2ltZzwvc3Ryb25nPiAtIGZhbHNlPC9saT48bGk+PHN0cm9uZz53b29fYmxvZ19jYXRfaWQ8L3N0cm9uZz4gLSA5PC9saT48bGk+PHN0cm9uZz53b29fYmxvZ19uYXZpZ2F0aW9uPC9zdHJvbmc+IC0gdHJ1ZTwvbGk+PGxpPjxzdHJvbmc+d29vX2Jsb2dfbmF2aWdhdGlvbl9mb290ZXI8L3N0cm9uZz4gLSB0cnVlPC9saT48bGk+PHN0cm9uZz53b29fYmxvZ19wZXJtYWxpbms8L3N0cm9uZz4gLSAvY2F0ZWdvcnkvYmxvZzwvbGk+PGxpPjxzdHJvbmc+d29vX2Jsb2dfc2lkZWJhcjwvc3Ryb25nPiAtIEJsb2cgUGFnZXM8L2xpPjxsaT48c3Ryb25nPndvb19ibG9nX3N1Ym5hdmlnYXRpb248L3N0cm9uZz4gLSBmYWxzZTwvbGk+PGxpPjxzdHJvbmc+d29vX2JyZWFkY3J1bWJzPC9zdHJvbmc+IC0gZmFsc2U8L2xpPjxsaT48c3Ryb25nPndvb19jdXN0b21fY3NzPC9zdHJvbmc+IC0gPC9saT48bGk+PHN0cm9uZz53b29fY3VzdG9tX2Zhdmljb248L3N0cm9uZz4gLSBodHRwOi8vd3d3LmJ6YXVnZy5jb20vd3AtY29udGVudC93b29fdXBsb2Fkcy8xMC1mYXZpY29uLnBuZzwvbGk+PGxpPjxzdHJvbmc+d29vX2Rpc2NsYWltZXI8L3N0cm9uZz4gLSDCqSBDb3B5cmlnaHQgMjAxMCBCcmlhbiBaYXVnZy4gQWxsIHJpZ2h0cyByZXNlcnZlZC4NCjxicj4NCig1MjApNzYyLTQ5NjINCjxicj4NCjxhIGhyZWY9bWFpbHRvOmJyaWFuQGJ6YXVnZy5jb20+YnJpYW5AYnphdWdnLmNvbTwvYT48L2xpPjxsaT48c3Ryb25nPndvb19leGNsdWRlX3BhZ2VzX2Zvb3Rlcjwvc3Ryb25nPiAtIDcwLDYxLDU4LDQ4LDI1MjwvbGk+PGxpPjxzdHJvbmc+d29vX2V4Y2x1ZGVfcGFnZXNfbWFpbjwvc3Ryb25nPiAtIDcwLDYxLDU4LDQ4LDI1MjwvbGk+PGxpPjxzdHJvbmc+d29vX2V4Y2x1ZGVfcGFnZXNfc3VibmF2PC9zdHJvbmc+IC0gNzAsNjEsNTgsNDgsMjUyPC9saT48bGk+PHN0cm9uZz53b29fZmVhdF9oZWlnaHQ8L3N0cm9uZz4gLSAyMTA8L2xpPjxsaT48c3Ryb25nPndvb19mZWF0X3dpZHRoPC9zdHJvbmc+IC0gMjgwPC9saT48bGk+PHN0cm9uZz53b29fZmVlZGJ1cm5lcl91cmw8L3N0cm9uZz4gLSBodHRwOi8vZmVlZHMuZmVlZGJ1cm5lci5jb20vaXRicmlhbjwvbGk+PGxpPjxzdHJvbmc+d29vX2dvb2dsZV9hbmFseXRpY3M8L3N0cm9uZz4gLSA8L2xpPjxsaT48c3Ryb25nPndvb19ob21lcGFnZTwvc3Ryb25nPiAtIGxheW91dC1kZWZhdWx0LnBocDwvbGk+PGxpPjxzdHJvbmc+d29vX2hvbWVfc2lkZWJhcjwvc3Ryb25nPiAtIEhvbWVwYWdlPC9saT48bGk+PHN0cm9uZz53b29faW5jX2ludHJvX3BhZ2U8L3N0cm9uZz4gLSBmYWxzZTwvbGk+PGxpPjxzdHJvbmc+d29vX2luY19pbnRyb19wYWdlX2xlZnQ8L3N0cm9uZz4gLSBmYWxzZTwvbGk+PGxpPjxzdHJvbmc+d29vX2luY19pbnRyb19wYWdlX3JpZ2h0PC9zdHJvbmc+IC0gZmFsc2U8L2xpPjxsaT48c3Ryb25nPndvb19pbmNfdGFiYmVyX3BhZ2VzPC9zdHJvbmc+IC0gZmFsc2U8L2xpPjxsaT48c3Ryb25nPndvb19pbnRyb19wYWdlPC9zdHJvbmc+IC0gPC9saT48bGk+PHN0cm9uZz53b29faW50cm9fcGFnZV9sZWZ0PC9zdHJvbmc+IC0gMjUyPC9saT48bGk+PHN0cm9uZz53b29faW50cm9fcGFnZV9yaWdodDwvc3Ryb25nPiAtIDU4PC9saT48bGk+PHN0cm9uZz53b29fbG9nbzwvc3Ryb25nPiAtIGh0dHA6Ly93d3cuYnphdWdnLmNvbS93cC1jb250ZW50L3dvb191cGxvYWRzLzEyLWxvZ29uYW1lLXRyYW5zLnBuZzwvbGk+PGxpPjxzdHJvbmc+d29vX21hZ19mZWF0dXJlZDwvc3Ryb25nPiAtIFNlbGVjdCBhIG51bWJlcjo8L2xpPjxsaT48c3Ryb25nPndvb19tYWdfc2Vjb25kYXJ5PC9zdHJvbmc+IC0gU2VsZWN0IGEgbnVtYmVyOjwvbGk+PGxpPjxzdHJvbmc+d29vX21hbnVhbDwvc3Ryb25nPiAtIGh0dHA6Ly93d3cud29vdGhlbWVzLmNvbS9zdXBwb3J0L3RoZW1lLWRvY3VtZW50YXRpb24vdGhlLXN0YXRpb24vPC9saT48bGk+PHN0cm9uZz53b29fcGFnZV9zaWRlYmFyPC9zdHJvbmc+IC0gSW5uZXIgUGFnZXM8L2xpPjxsaT48c3Ryb25nPndvb19yZXNpemU8L3N0cm9uZz4gLSB0cnVlPC9saT48bGk+PHN0cm9uZz53b29fc2hvcnRuYW1lPC9zdHJvbmc+IC0gd29vPC9saT48bGk+PHN0cm9uZz53b29fc2xpZGVyPC9zdHJvbmc+IC0gZmFsc2U8L2xpPjxsaT48c3Ryb25nPndvb19zbWFsbHRodW1iX2hlaWdodDwvc3Ryb25nPiAtIDQyPC9saT48bGk+PHN0cm9uZz53b29fc21hbGx0aHVtYl93aWR0aDwvc3Ryb25nPiAtIDU2PC9saT48bGk+PHN0cm9uZz53b29fc3VibmF2PC9zdHJvbmc+IC0gdHJ1ZTwvbGk+PGxpPjxzdHJvbmc+d29vX3RhYmJlcl9wYWdlczwvc3Ryb25nPiAtIDcwLDYxLDU4LDQ4PC9saT48bGk+PHN0cm9uZz53b29fdGhlbWVuYW1lPC9zdHJvbmc+IC0gVGhlIFN0YXRpb248L2xpPjxsaT48c3Ryb25nPndvb190aGVfY29udGVudDwvc3Ryb25nPiAtIGZhbHNlPC9saT48bGk+PHN0cm9uZz53b29fdGh1bWJfaGVpZ2h0PC9zdHJvbmc+IC0gNzY8L2xpPjxsaT48c3Ryb25nPndvb190aHVtYl93aWR0aDwvc3Ryb25nPiAtIDEwMDwvbGk+PGxpPjxzdHJvbmc+d29vX3R3aXR0ZXI8L3N0cm9uZz4gLSBpdGJyaWFuPC9saT48bGk+PHN0cm9uZz53b29fdXBsb2Fkczwvc3Ryb25nPiAtIGE6MTA6e2k6MDtzOjY2OiJodHRwOi8vd3d3LmJ6YXVnZy5jb20vd3AtY29udGVudC93b29fdXBsb2Fkcy8xMi1sb2dvbmFtZS10cmFucy5wbmciO2k6MTtzOjY2OiJodHRwOi8vd3d3LmJ6YXVnZy5jb20vd3AtY29udGVudC93b29fdXBsb2Fkcy8xMS1sb2dvbmFtZS10cmFucy5wbmciO2k6MjtzOjU5OiJodHRwOi8vd3d3LmJ6YXVnZy5jb20vd3AtY29udGVudC93b29fdXBsb2Fkcy8xMC1mYXZpY29uLnBuZyI7aTozO3M6NTg6Imh0dHA6Ly93d3cuYnphdWdnLmNvbS93cC1jb250ZW50L3dvb191cGxvYWRzLzktZmF2aWNvbi5wbmciO2k6NDtzOjY1OiJodHRwOi8vd3d3LmJ6YXVnZy5jb20vd3AtY29udGVudC93b29fdXBsb2Fkcy84LWxvZ29uYW1lLXRyYW5zLnBuZyI7aTo1O3M6Njg6Imh0dHA6Ly93d3cuYnphdWdnLmNvbS93cC1jb250ZW50L3dvb191cGxvYWRzLzctYmFubmVyLWxvZ28tdHJhbnMuanBnIjtpOjY7czo2ODoiaHR0cDovL3d3dy5iemF1Z2cuY29tL3dwLWNvbnRlbnQvd29vX3VwbG9hZHMvNi1iYW5uZXItbG9nby10cmFucy5qcGciO2k6NztzOjYxOiJodHRwOi8vd3d3LmJ6YXVnZy5jb20vd3AtY29udGVudC93b29fdXBsb2Fkcy81LWxvZ28tdHJhbnMuZ2lmIjtpOjg7czo2MToiaHR0cDovL3d3dy5iemF1Z2cuY29tL3dwLWNvbnRlbnQvd29vX3VwbG9hZHMvNC1sb2dvLXRyYW5zLmdpZiI7aTo5O3M6NjY6Imh0dHA6Ly93d3cuYnphdWdnLmNvbS93cC1jb250ZW50L3dvb191cGxvYWRzLzMtbG9nb19iemF1Z2dfY29tLmpwZyI7fTwvbGk+PC91bD4=