Free Essay

Medical Id Theft

In:

Submitted By abarlahan
Words 3118
Pages 13
Final Paper: Medical Identity Theft at Molina Healthcare, Inc.
Barlahan, Andrei
ID B00459963
Brandman University

Define the Problem
Medical Identity theft has become an increasing problem in the United States and continues to negatively impact millions of individuals. Medical identity theft usually occurs when individuals share their information with someone else, who in turn uses that information to receive medical services and fill for prescriptions. Other times, individuals lose their medical card or have their information stolen by a friend or close relative. According to a 2013 survey conducted by the Medical Identity Fraud Alliance (MIFA), medical identity fraud has increased nearly 20 percent compared to the year before in the U.S., affecting an estimated 1.84 victims and having a total out-of-pocket medical costs incurred by medical identity theft victims of $12.3 billion (DeGaspari, 2013). This is a serious problem, because not only are millions of dollars wasted, but patient medical records are compromised, which can result to misdiagnoses, wrong procedures and treatment, and wrong prescriptions.
On a smaller scale, Molina Healthcare’s Special Investigation Unit (SIU) conduct investigations on referrals they receive indicating a Molina member may have been a victim of identity theft. A lot of times when the issue is actually identity theft, the SIU is only able to “band-aid” the problem and have found the issue resurfacing months later and Molina continuing to pay claims for services the actual member did not receive. An example of this is a referral the SIU received in 2013, indicating that a Molina member’s identity had been stolen. Someone had used our member’s health information to receive hospital services for severe illness at another state. The SIU interviewed the member and confirmed that they have never traveled outside their city they were currently living in, nor ever been diagnosed with any illness. This creates a major problem because Molina paid for services that were not rendered and the member’s medical records has been compromised and may affect his health insurance eligibility in the future due to false diagnoses.
What the SIU did was inform all the hospitals that were impacted and let them know that after investigation, it was found that it was not a Molina member that they had seen and as a result, the claims that were paid would be retro-denied. The SIU also made the Enrollment department aware to flag the member’s account for identity theft. For a while, it looked like the problem had been resolved and the steps that were taken had prevented the impersonator from obtaining services using our member’s ID. Though, months later, the SIU received a new referral indicating the same member’s account had been compromised again and claims for hospital services were able to get passed the system, even with an identity theft alert on file and the claims were paid.
This raised questions of how this was possible and how are we able to prevent this from happening in the future. Was this a communication problem between departments? Is there a conflict with the different systems that are in place? Are there additional steps we can take to empower members to detect and prevent identity theft? The main problem is that Molina is losing thousands of dollars due to inappropriately paying out claims for services the member did not receive and the process that is currently in place is not enough to tackle the problem.
Determine the Objectives
In most private-sector decisions, profit is the principal objective of the firm and the usual barometer of its performance. Thus, among alternative courses of action, the manager will select the one that will maximize the profit of the firm (Samuelson, pg. 7-8). Molina Healthcare has moved to being a public company since 2002, but profit still becomes a driving factor for the company. Their main mission is to provide quality health services to financially vulnerable families and individuals covered by government programs, but to also be careful in the management of their financial resources and serve as prudent stewards of the public’s funds.
As part of the SIU, one of our main goals is to maximize the company’s profits and decrease the millions of dollars inappropriately paid to health care providers. One of our other objectives is to ensure the safety of Molina members, while conducting investigations of potential fraud, waste and abuse. One way we accomplish to do this is to identify individuals who have stolen our members’ identity in able to receive medical services. While doing so, we must also be aware to have the most effective and cost-effective processes in place when dealing with identity theft issues. Currently, the process Molina has for identifying identity theft is reactive. Potential identity theft is only investigated once a member or a Molina employee suspects and reports it. By the time an investigation is opened, thousands of dollars could have already been inappropriately paid to providers and prescriptions from different pharmacies could have been filled.
Explore the Alternatives:
There are various ways of how the SIU can tackle medical identity theft. One of the ways we can decrease medical identity theft at Molina is to create a written Identity Theft Prevention Program designed to detect the warning signs of identity theft. This includes gathering resources from other anti-fraud organizations to pave way for a more educational and proactive tool to prevent medical identity theft. The Federal Trade Commission has a brochure that educates members about ID theft and it provides numbers to report ID theft to (BOCP, 2011). The most important points from this brochure can be included in the written program, along with a check list of questions that members can ask themselves when trying to identity whether they may be victims of identity theft. This written program will also include the various suspicious patterns that may indicate identity theft.
This written Identity Theft Prevention Program can be given to members when they first sign up with Molina and then every year after that, so they are reminded of the importance of identifying possible ID theft. The written program can also be given to providers during their orientation, so they can also be aware of what to look for when seeing patients. There can be a portion in the written program of what providers can look for, such as verifying ID before seeing patients and making sure their ID is not fake. Included in the program is an ID theft Response Plan (HDM, 2014). This is executed by employees once members identify ID theft. Some actions included in the response plan would be to contact local law enforcement and to lock the member into only one pharmacy. If Molina can become more proactive about ID theft, then members will more than likely follow and do their part to prevent their accounts from being used by someone else.
Another way to fight medical identity theft is to implement a new system that alerts all departments involved in handling claims. Users of this system would include the Member Services Department because they are usually in the front line and communicate with members pretty often. Utilization Management and Claims Department would be the main users of this system because they are the ones that approve and deny authorizations and pay or deny claims. Other departments that would have this system would be Pharmacy Services because they handle paying for prescriptions and if they are notified of identity theft issues right away, they can stop prescriptions from being filled. Lastly, The SIU would also be included in this system because we are in charge of conducting the potential ID theft issue and determining whether it is actually ID theft.
The new system put in place will ensure that everyone involved in the claims process is on the same page. It will force all suspected claims to be inspected by a Claim Reviewer before it is paid. Currently, Molina has an adjudicated system for claims and the computer analyzes a claim by certain criteria. If it meets the criteria, then it will automatically pay the claim, without the need for human contact. Though, the adjudicated system is convenient and is another way to help save the company money, it is not convenient or cost effective when it comes to trying to stop inappropriate claims from being paid as a result of identity theft.
Under the Every year, Molina educates their employees about fraud, waste and abuse by requiring all employees to take a training course through the company’s intranet. In addition to this training course, the SIU can create another training course specifically for medical identity theft, so employees can learn how to detect and prevent is type of fraud. In this training course, the SIU can include various examples of identity theft cases. Also, including statistics regarding ID theft cases and overpayment amounts identified can help create a picture for employees of how serious identity theft is. This can motivate employees to take action against potential ID theft.
Another way to tackle identity theft at Molina is for the SIU to collaborate with other health care organizations to discuss and improve ID theft efforts. If we are able to do this, then we can share processes that we have in place and obtain feedback from a different perspective than our own. This can dramatically improve our processes. As our health care system increasingly relies on digitized health care information, health care fraud risks will develop and grow, including the threat of medical identity fraud, particularly through cyber attacks. To face these threats, it is critical that our industry commits itself to greater sharing of health care fraud investigative information (AHIP, 2014). Currently, there is actually an existing organization that partner with other health organizations and takes anti-fraud information sharing to the next level. That organization is called Healthcare Fraud Prevention Partnership (HFPP) and they have not yet been fully established, as there are some laws in place that limit health information sharing. Though, once they are able to get passed certain laws, Molina should join in this movement in sharing information.
Lastly, the SIU can decide to take no action and keep the same processes we already have in place for fighting identity theft. We can continue to use the same resources and wait until referrals come to the SIU, indicating potential ID theft has been identified. Once identity theft has been identified, we can alert all departments that are involved with claims by making phone calls.
Predict the consequences
Predicting the consequences to the options mentioned above can help narrow down the best path to take when it comes to fighting and preventing ID theft. If an Identity Theft Prevention Program is created and implemented, one of the consequences that we can foresee is the increase in volume of referrals the SIU will receive that actually isn’t identity theft. Also, this may increase the fear members may have about identity theft. If we implement a new system that alerts all departments that handle the member’s claims, this may be costly due to training and development of the system. This may also take years until it is implemented. Having an additional training course about medical identity theft for employees to take may also be costly, in terms of production that is slowed down because of employees taking the training course during work hours. Collaborating with the HFPP may be a good idea, but we may be taking a risk of violating some laws when it comes to information sharing. We may also be limited to what information can be shared. Lastly, if we do nothing then the company will lose millions of dollars over time and as mentioned, doctors may misdiagnose members and prescribe them incorrect medications.
Make a Choice To determine which alternative is the best to use in this situation, I used a forced decision matrix. Looking at the matrix below, I have come up with five criteria than can be used to evaluate the different alternatives. I decided that return on investment (ROI) id an important criteria to consider. Return on Investment attempts to measure the profitability of an investment (Investopedia, 2014). After analysis, I found that the ID Theft Prevention Program would probably bring the most return on investment because it much cheaper and easier to prevent ID theft than to recoup monies that have been inappropriately paid due to ID theft. Providing additional training, specifically for medical ID theft is not too costly and again, prevention is much more efficient. In terms of return on investment, doing nothing will more than likely cause the company to lose profits because over time monies inappropriately paid will add up and sometimes even go undetected. Expenses is another criteria that I wanted to look at. The cost of each alternative plays a big factor since Molina gets their money from the government. This goes back to being prudent stewards of public funds. Providing additional training and devising an ID Theft Prevention Program will cost less money because it is just gathering information from different anti-fraud resources and creating an educational tool for employees and members. The most costly would be implementing a new system that alerts all departments involved in the member’s claims. Some costs in implementing a new system include paying an employee do to extensive research on different vendors that specialize in this universal system and then the training and integration of this new system. Difficulty of making the change after an alternative is chosen also plays an important role. In this case, doing nothing is the most convenient. Implementing the ID Theft prevention program won’t be so difficult because it is mostly for members to have tools on how to detect ID theft. Providing additional FWA training may cause some inconvenience because it takes work time for employees to complete the training. Implementing a new system will be the most inconvenient because it calls for integration of the new system and employees may not have the capacity to take on a new system. The time it takes to implement is another key criteria that I wanted to consider. Additional training would take the least time to develop. Implementing an ID Theft Prevention Program also would not take very long to implement because it only calls for gathering information and putting it together. Collaborating with other health organizations and implementing a new system are the alternatives that will take the most times because it requires additional work than just gathering information. The last criteria I wanted to look at was the overall impact these alternatives have on members. The ID Theft Prevention Program has the best impact because it works directly with educating the members and it provides them with tools to take action when ID theft is suspected. Providing additional FWA training about ID theft to employees can also have a positive impact on members because members will usually interact with Molina employees who can pass on the knowledge they have about ID theft. Implementing a new system may be a reactive option and it doesn’t positively impact members directly. Doing nothing and keeping the same processes can actually have a negative impact on members because over time, ID theft can go undetected and members may be misdiagnosed. After adding up the totals from the matrix below, the best option to choose would be to create an ID Theft Prevention Program. | ID Theft Prevention Program | Implement new system | Provide Additional FWA Training | Collaboration with other health organizations | Do nothing | ROI | 1 | 4 | 2 | 3 | 5 | Expenses | 2 | 5 | 1 | 3 | 4 | Difficulty of change | 2 | 4 | 3 | 5 | 1 | Time it takes to implement | 3 | 5 | 2 | 4 | 1 | Overall impact on members | 1 | 4 | 2 | 3 | 5 | | 9 | 22 | 10 | 18 | 16 |

Perform Sensitivity Analysis
Because the ID Theft Prevention Program does not require new technology to be implemented and expenses would mostly come from paying employees to extract information from existing resources and the cost of paper to print the programs to send to members, this would be the best choice. To make sure that the ID Theft Prevention Program is the most optimal choice and the choice that will actually save the company more money, a sensitivity analysis may be performed. Sensitivity analysis considers how an optimal decision is affected if key economic facts or conditions vary (Samuelson, pg. 12). One key economic fact is that costs and revenue is uncertain. In the case that the program is costing more that the predicted cost, then the information that has been gathered can be integrated into the existing processes until budget is approved for more money to complete the program. Another condition to keep in mind is burnout for employees that will be developing this program. The creation of this program will be an SIU project, but to prevent burnout, certain portions of the program can be assigned to specific departments. The Legal Department can be involved since they work directly with certain laws, such as the False Claims Act and Health Information Portability and Accountability Act. Member Services and Enrollment Services can also be assigned to notify members of the new efforts.
Once the program has been complete, a copy has been added to the Molina website and hard copies have been sent to members, the SIU will continue to monitor the impacts that the program makes. The SIU will keep track of the savings identified due identity theft. A survey will be given out to members every year about how knowledgeable they are about ID theft and how confident they are about identifying it. Once feedback has been obtained, ongoing actions to make changes to the program will occur to make sure it is the most effective it can be.

References
American Health Insurance Plans (AHIP). 2014. Medical Identity Theft, Part 1 The Stakes and Consequences for Health Plans
Bureau of Consumer Protection (BOCP). 2011. Medical Identity Theft: FAQs for Health Care Providers and Health Plans. Retrieved from http://www.business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan
DeGaspari, John. 2013. Medical Identity Theft Is Up, Affecting 1.84 Million U.S. Victims: Report. Retrieved from http://www.healthcare-informatics.com/article/medical-identity-theft-affecting-184-million-us-victims-report
Health Data Management (HDM). 2014. How Small Healthcare Organizations Can Fight ID Theft. Retrieved from http://www.healthdatamanagement.com/gallery/how-small-healthcare-organizations-can-fight-ID-theft-49051-1.html
Investopedia. 2014. Return on Investment – ROI. Retrieved from http://www.investopedia.com/terms/r/returnoninvestment.asp
Samuelson, W. F., & Marks, S. G. (2012). Managerial Economics (7th ed.). Hoboken, NJ: John Wiley & Sons, Inc.

Similar Documents

Premium Essay

Identity Theft

...Identity Theft I know three people who have been affected by identity theft in the past. They were forced to deal with the hassle of clearing and repairing their good names and financial reputations. According to my research, there was a new victim of identity theft in the U.S. every two seconds within the last year and over 9 million Americans reported that their identity had been stolen (Rogers, 2014). The primary complaint on the Federal Trade Commission’s list of top consumer complaints is identity theft (Trowbridge, 2014). This crime has gone from actions like rooting through a person’s trash and stealing their mail to confidence scams to gain access to personal information. With the possibilities that are provided by the internet criminals are capable of gaining access to and stealing personal information from a larger pool of prospective victims from all across the world. What is Identity Theft? According to Merriam-Webster, identity theft is “the illegal use of someone else's personal information (as a Social Security number) especially in order to obtain money or credit” (Merriam-Webster, 2014). Some of the items that a person would utilize to steal another person’s identity are Social Security Numbers, driver's license numbers or their date of birth just to name a few of the pieces of information. The thief can take this information and use it to obtain things such as credit cards, bank accounts, auto loans, and home mortgages in the victim’s name. Some...

Words: 1134 - Pages: 5

Free Essay

Id Theft

...IDENTITY THEFT Fraud- intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation. (1) Fraud affects individuals, businesses and the economy as a whole. Every year millions of dollars are lost due to activities of scammers using countless illegal techniques to achieve their goals. As hard as people work to make money and as difficult as it is to save it, the last thing they want to do is lose any of it through fraud. Financial fraud is the number one consumer complaint, and the biggest danger all the people face nowadays is identity theft, one of the most pervasive and insidious crimes. Identity theft occurs when someone assumes some or all of your identity to engage in criminal behavior. The first case of identity theft is described in the Bible when Jacob covered his hands and neck with goat skin in order to trick his father into giving him a blessing of a firstborn, in order to acquire all the property and livestock his father owned. In early American history, identity theft was focused on voters’ registration and ballot stuffing. Then in1930’s, brought 21’st amendment to the United States Constitution brought the new law that repealed prohibition. Alcohol was legal again, but drinking age was determined by individual state, until 1984 when US Congress passed the National Minimum Drinking Age Act. Between these times worst crime committed was underage drinking using fake ID. Usage of assumed name and identification...

Words: 2899 - Pages: 12

Premium Essay

Is3920 Lab 9

...Order Code RL33199 Data Security Breaches: Context and Incident Summaries Updated May 7, 2007 Rita Tehan Information Research Specialist Knowledge Services Group Data Security Breaches: Context and Incident Summaries Summary Personal data security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver’s license numbers, as well as medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of January 2007, 35 states have enacted legislation requiring companies or state agencies to disclose security breaches involving personal information. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted. This report will be updated regularly. Contents Introduction . . . . . . . . . . . . . . . . . . . ....

Words: 18803 - Pages: 76

Premium Essay

How Identity Theft Affect the Culture of Our Society

...How Identity Theft Affect the Culture of our Society Sections I, II, III and IV Rodrekus Baskin DeVry University How Identity Fraud and Theft Impact the Culture of Our Society Section I Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how identity theft works or happens, one need to know and understand what identity theft is, the different forms of identity theft, cyber security and the impact on its victims, the methods used by identity thieves to obtain identifying information about their victims, and preventive solutions. How Identity Theft Affect the Culture of Our Society A single mother looking forward to advancing her financial situation comes across what appears to be the opportunity she has been waiting for. A real estate agent has provided her with the fortune of owning her own home and without skepticism of any impending dangers or foul play, even though he displayed what appeared to be proper credentials, she relinquished all of her personal data...

Words: 5785 - Pages: 24

Free Essay

Identity Theft

...Identity Theft + Fraud= Identity Crime 20 December 2007 There is a thief that lurks around us everyday; this thief can attack in brad day light or in the darkest hour, and just about anywhere you may find yourself. This thief has the power to act in your name, make unlimited purchases, open up credit accounts and ruin your good name and credit all in the matter of seconds; if you are vulnerable enough, you might become his next victim. In many cases all he needs is your name and a social security number, and he has enough information to make you his next victim; if you don’t believe me then ask the millions of Americans that became victim’s, or just ask me. The thief that I am talking about is identity theft. Identity theft is a crime that is affecting many Americans, the costs are well in the millions every year, but with a little bit of knowledge and adaptive common practices, you can help fight back and minimize your chances of becoming the next victim of Identity theft. Identity theft is as predictable as a giant storm; you really don’t know what the damage will be until it passes and many victims don’t even see it coming until its already too late. So what is identity theft? According to the webpage article “about identity theft,” the Federal Trade Commission (FTC) (2007) writes that “identity theft occurs when someone uses your personal identifying information, like your name, SSN… without your permission to commit fraud or other crimes.” (para 1) All it takes...

Words: 3405 - Pages: 14

Premium Essay

Community Health

...We Can But Should We? Rose Tarchala NR361: Informatics in Nursing September 27, 2012 Introduction Picture this, you come home to find you backyard gate open and your best friend of 10 years – FIDO has escaped! Once inside your home you notice you have a voicemail, the local animal shelter has found and identified FIDO and he is safe, warm and happy awaiting your arrival to bring him home. The shelter was able to identify FIDO from the avid chip you had implanted several years ago in the event something like this might happen. How many times have you walked out the door of you favorite department store only to be stopped by the screeching and embarrassing alarm because the store clerk forgot to remove or desensitize one of their “sensors”. How many of us have apps on our cell phones that will help us avoid traffic or even locate your errant teenager when they choose not to answer your calls? I like the family locator app very much, much to my children’s dismay. All of the technology that we have become accustom using in daily life can be and is being used in healthcare today. This technology is called – Radio Frequency Identification (RFID) and Quick Response Codes (QR) are being developed for many reasons; patient identification and safety, saving healthcare workers and organizations time and money and helping patients be more compliant with their healthcare to name just a few applications of RFID use. In this paper I will discuss some of the benefits of RFID use in...

Words: 1024 - Pages: 5

Premium Essay

School Uniforms

...violence are down. I urge you all to think about what benefit this could bring to public schools. I.          Introduction A. School uniforms have been a major issue to the school systems for many years. In the last forty years, public education has seen many changes in school dress styles. B. Fastest growing and most unreported type of identity theft     1. Many years going unnoticed     2. Many people don’t think to look     3. New form of ID theft… lower risk for thief C. Shocking Statistics 1. Theft of children under 5 has jumped 105% nationally last year 2. 35% more child identity thefts than adults II.    Body             A. Identity Theft                             1. Establishing a child’s identity a. Assigned at birth b. Used on taxes and medical documents 2. What is identity theft? a. when someone uses personal information to commit fraud by using that identity to obtain loans, credit cards, or commit crimes. b. estimated 9 million thefts a year. 140,000 of that was children in 2011 3. How do thefts steal identities (synthetic ID) a. many think “how does one impersonate a toddler” b. takes social security number, adds fraudulent name, adds an adults birth date and address c. Most companies do not have an adequate system to identify false social security numbers because child’s has never...

Words: 669 - Pages: 3

Free Essay

Identity Theft

...Rasmussen College | Identity Theft | The long term issue | | Caden Ross | 2/17/2013 | Author's Note: This research is for Professor Rob Paixao B234/BUL2241 Section 01 Business Law Course written by Caden Ross on 02/17/2013. | Jeffrey Gerald Jackson, otherwise known as Troy Lee Evans, was arrested on September 4,2012 for identity theft. Mr. Jackson used the identity of Troy Lee Evans to gain employment at Credit Concepts Inc. Mr. Jackson had worked at Credit Concepts Inc. under this false ID for six years. Through his job there he had access to important personal information that allowed him to obtain several loans using other people's identities. Police uncovered at least six separate incidents in which Mr. Jackson used other peoples information to obtain loans for himself. His bail was set at $45,000.00 and police are asking for anyone to come forward with any additional information about other crimes he may have committed. [ (Bella, 2012) ] Identity Theft is a heinous crime with long term repercussions for it victims. Mr. Jackson's case shows how much a person can do with identity theft. He not only used other people's information to obtain loans but he lived as someone else for six years and worked as this person. This means that for six years income was reported to the IRS and Social Security as Mr. Evans when it was not his income. Any bills that Mr. Jackson has taken out in Mr. Evans name like utilities or rent can show up on Mr. Evans credit if they...

Words: 976 - Pages: 4

Premium Essay

Identity Theft

...IDENTITY THEFT NAME: INSTITUTION: IDENTITY THEFT Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005). There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards or phone accounts in the names of their victims. These victims may not learn out about it for some period of time, until they notice some charges they did not make, or are contacted by a person or people claiming that they owe them. It may sometimes cost them hundreds or thousands of dollars and a lot of time while trying to undo the damage (Keith, 2005). Identity theft could ruin an otherwise spotless reputation. It could also lead to much suffering if the victims are held responsible for the thief’s actions. TYPES OF IDENTITY THEFT Identity theft can be divided into the following categories: • Criminal identity theft, that is, pretending to be another person when arrested for an offense • Child identity theft. • Financial identity theft, that is, using the identity of another...

Words: 1923 - Pages: 8

Premium Essay

Identity Theft Paper

...Identity Theft John Smith Concepts and Applications of Information Technology 7 April 2012 Richard Jones Identity Theft Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can damage your finances, credit history, and reputation. It can take time, money, and patience to resolve. Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. Furthermore, the internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves (Privacy and Identity). Identity thieves are resourceful. They dig through your garbage, the trash of businesses, or public dumps. They may work or pretend to work for legitimate companies, medical offices, clinics, pharmacies, or government agencies, or convince you to reveal personal information. Some thieves pretend to represent an institution you trust, and try to trick you into revealing personal information by email or phone. Some of the clues that your identity has been stolen are for example: withdrawals from your bank account that you can’t explain; don’t get your bills or other mail; debt collectors call you about debts that aren’t yours; unfamiliar accounts or charges on your credit report; medical...

Words: 908 - Pages: 4

Free Essay

Identity Theft Research Paper

...Identity Theft Abstract This research paper will examine what is known about identity theft. The paper begins with defining the crime and its background, followed by a review of the patterns and incidences of identity theft. This review will include data on the extent and costs of this crime. Discussion will then focus on victims and perpetrators of identity theft. Common techniques used by identity thieves will be explored along with tips to protect consumers and businesses from having their identities stolen or data breached. Legislation in place to prevent and prosecute identity theft will be discussed. How to report identity theft is also explained. Defining Identity Theft The U.S. Department of Justice defines identity theft, also called identity fraud, as “all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain” (U.S. Department of Justice, 2015). Identity thieves use personal data such as Social Security numbers, bank account or credit card numbers to personally profit at the victim’s expense. These breaches allow thieves to take funds out of bank accounts or in the worst cases, take over a victim’s identity completely, running up huge debts and committing crimes using the victim’s name. Victims not only suffer the out-of-pocket financial losses, but they may have to rebuild their reputation in the community due...

Words: 4583 - Pages: 19

Premium Essay

Idenity Theft

...Identity theft is the biggest crime in the world today. For over ten years, identity theft (in all forms) has been the number one consumer complaint. In 2012 identity, theft affected more than 16.6 million Americans alone. With the 16.6 million people affected, there was a financial loss of 21 billion dollars. That number only went up in 2013 to 24.7 billion dollars and so far, for 2014 we beat that number by over one billion dollars. Finklea, Kristin 2014) With this growing epidemic, we need to educate ourselves on what identity theft is, how it affects us and how to protect ourselves in this new cyber world. Types of Identity Theft It may surprise people to know that there are many different types of identity theft. The most common and often the first thing people think of when they hear identity theft is financial identity theft. This is when a person’s credit cards and/or bank accounts are accessed and used without the owner’s permission or knowledge. The thief can do this by withdrawing money from the victims back account or by maxing out their credit cards. Another way a criminal could commit financial identity theft is by opening new accounts in the victim’s name; such as credit card and even loans. This type of financial identity theft could take the victim years and thousands of dollars to correct. One of the first cases that received the attention of national headlines of financial identity theft was from 1992. In one notorious case of identity theft, the...

Words: 1896 - Pages: 8

Premium Essay

Identity Theft

... 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses personal...

Words: 485 - Pages: 2

Premium Essay

Psy/425

...Rebecca Chiavetta, Jami Krebs, and Lisa Meier PSY 425 November 12, 2012 Dr. Elizabeth Riegner Drug-Free Workplace Evaluation Imagine an employee is returning from a lunch break, and a coworker is collaborating with this individual in an erratic manner. The coworker’s actions make this employee feel unsafe, and cause him or her to become unproductive. The coworker has an accident, and the company is shutdown to investigate the accident. The previous scenario has often occurred throughout the United States, causing companies to lose money from possible lawsuits, and decreased productivity in the workplace. Illicit, and prescription drug use is prevalent in the United States, and causes absenteeism, accidents, downtime, turnover, theft, morale issues, and decreased productivity in the workplace (University of Phoenix, 2012). This proves that companies benefit from instituting drug-free workplace policies with mandatory drug testing within the workplace. Creating a drug-free work environment is a cost-effective necessity in the workplace, and establishing a drug-free work environment will have positive effects on a company. Prevalence of illicit and prescription drug users in the United States workforce Prescription drugs are "dispensed to the public only with an order given by a properly authorized person" (The Free Dictionary, 2012, p. 1). In 1999, American's spent nearly $104.7 billion on prescription drugs, which soon increased to $234 billion in 2008 (Lee, 2012)...

Words: 1401 - Pages: 6

Free Essay

Personal Identifiable Information

...issues. PII comes in handy in modern technology. The most commonly used information to identify individuals are ID and drivers numbers, social security numbers, vehicles registration number, date of birth, biometrics, facial recognition to name a few. If PII did not exist, it would be incredibly hard to narrow down and individual since many people share names. There are some advantages that tie in with PII when it comes to the purpose of distinguishing individual identity. Big corporations find PII important identifying their employees. For example most companies have employee ID which is unique from one employee to another. Government officials need to use PII to search and identify and distinguish individuals in their large data base. For example, all legal US residences have a social security number that identifies an individual. In forensic, PII is important to help track down and identify criminals. This identity can be obtained through facial recognition and finger prints resulting in a selective revelation of one’s identity. Finger prints are unique with each individual. As there are advantages to PII, there are disadvantages as well. Almost everyone is technologically savvy and tend to use the internet for their everyday life. For example, it is very convenient to shop, bank online, study, access medical records search and apply for jobs in order to have access to all this different...

Words: 765 - Pages: 4