Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Medical Identity Theft
Transcript of Medical Identity Theft
Working definition of Medical Identity Theft.
Monitor your Health Records
Only share with trusted providers
Maintain a copy of your medical records
Beware of "Free" medical services
Safeguard insurance cards
Monitor your credit reports
Take data breaches seriously
Food for thought!
This is where your information can go.
Control your personal information, who see's it, who copies it, why do they need it? Simple steps to keep from being faceless in this web of lies.
Who are you?
What is Medical Identity Theft.
Identity Theft is the use of personal information of someone other than yourself for fraudalent gains such as recieving medical benefits.
Federal Trade Commission
Electronic vs. Paper Documents
Applications for anything
Mancilla, D., & Moczygemba, J. (January 01, 2009). Exploring medical identity theft.Perspectives in Health Information Management / Ahima, American Health Information Management Association, 6.
Conn, J. (January 01, 2006). A real steal. Patients, providers face big liabilities as medical identity theft continues to rise, and in many cases it's an inside job. Modern Healthcare, 36, 40, 26-8.
How can Medical Identity theft be prevented?
Victims of medical identity theft are often at a disadvantage because it takes so long to detect. Researchers and medical personnel recommend that if you notice any indication that you've become a victim, take action immediately.
Things to think about.
Numbers to realize.
7% of Smartphone users are victims of Identity theft.
Identity fraud increased 18%
67% increase in data breaches
Victims of data breaches are 9.5 times more likely to become a victim of Id theft.
Victims of choice: 20- 29 year olds
Id Theft complaints increased in Idaho by 27%
Tips for Protecting yourelf and family.
ID theft still on the rise.
-According to The Affordable Care Act, many medical practices are now required to
store medical records electronically.
-For consumers and doctors, it is easier to manage and view medical documents.
However, this opens the door for hackers and identity thieves. It is estimated that
approximately 92% of all health companies have experienced a breach of some sort.
-Electronic medical records are stored on a server. Most are connected to the internet,
allowing the records to be easily transferred from office to office and allowing remote
employee access. The internet connections are what allow hackers to access the data.
How are medical records stored?