Theranos
Read Time: 7 mins
Written By:
Steve C. Morang, CFE
Imagine you’re about to be married, and you’re trying to buy your first home to start your family. When you request your credit history to apply for a mortgage, you discover that supposedly you’ve received collection notices for high emergency room bills; however, you’ve never been treated in the ER.1
Or consider that you’ve been waiting anxiously to see the results of a medical test. You receive in the mail not only your results but those of two others with their names, addresses and insurance numbers.
Or maybe you received a letter informing you that an employee at a company that provides technology-based services to medical industries had leaked 500 patients’ sensitive information and you were one of them.2
And you definitely don’t want to have Anndorie Sachs’ troubles. The local authorities mistakenly reported her as an unfit mother and threatened to take her four children away. A pregnant woman — a meth user — had stolen Sachs’ medical identity, delivered a baby in Sachs’ name, abandoned her child at the hospital and left Sachs with a $10,000 hospital bill.3
This woman’s crimes could hurt Sachs throughout her life. The perpetrator had a different blood type than Sachs, and uncorrected co-mingled medical records could result in Sachs’ death if she ever needed a blood transfusion. A future health care provider might even prohibit her from reviewing her medical records because they might not be in her name. Once Sachs disclosed that those records weren’t hers, her health care provider denied her access to them because the provider had to now protect the records of the woman who stole Sachs’ identity. Sachs was unable to verify that all the removed records were just those of the thief. The health care industry is addressing this market conflict.
The perpetrators rack up insurance claims or high charges through treatment in emergency rooms where physicians are required to treat patients regardless of insurance coverage.
Insurance companies that pay the claims along with providers (hospitals, doctors and clinicians treating patients) might be secondary victims because they often have to write off expenses incurred by the thief. They might also spend time and money in working with victims to correct medical histories and records. The most significant consequence for the providers of care is compromised medical decision making because of incorrect patient information.
Perpetrators commit medical identity fraud for many reasons: to simply obtain free services, steal benefits or services for which they’re ineligible or to perpetrate other frauds or illegal activities such as pilfering drugs for personal use or illegal distribution.
The AHIMA practice brief, “Mitigating Medical Identity Theft,” includes an 18-step consumer checklist guide to begin the process of mitigating MIT:
MIT victims have to thoroughly inspect medical bills and records to decide if their charges and medical information is correct. Victims must fight imposters’ charges and correct any altered medical information — a difficult task, at best. The ultimate insult is when a victim’s benefit plan places services on hold because the perpetrator depleted dollars in the account. (Unfortunately, the health care industry has been slow to provide ways to repair medical identities. However, it has become an emerging cottage industry because of the millions lost annually.)
The U.S. Health Insurance Portability and Accountability Act — more commonly known as HIPAA — guarantees all Americans copies of their medical records. However, unlike the laws that guarantee each person a copy of his or her credit report, HIPAA doesn’t guarantee free medical records. Some medical providers charge, and they can be quite expensive. Also, HIPAA protects the privacy of thieves’ medical information, which can further impede victims’ search for medical histories’ changes.11
The Association of Certified Fraud Examiners assumes sole copyright of any article published on www.Fraud-Magazine.com or www.ACFE.com. ACFE follows a policy of exclusive publication. Permission of the publisher is required before an article can be copied or reproduced. Requests for reprinting an article in any form must be emailed to FraudMagazine@ACFE.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 7 mins
Written By:
Steve C. Morang, CFE
Read Time: 7 mins
Written By:
Damien Chaminade, CFE
2 minutes
Written By:
Randi Zimmer, CFE
Read Time: 7 mins
Written By:
Steve C. Morang, CFE
Read Time: 7 mins
Written By:
Damien Chaminade, CFE
2 minutes
Written By:
Randi Zimmer, CFE