<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; medical fraud</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/medical-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Little progress made in the prevention of medical data breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/#comments</comments>
		<pubDate>Tue, 01 Jan 2013 16:32:55 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[HITECH Act]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1919</guid>
		<description><![CDATA[Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient data protection and security has made very little improvement according to the latest study from Health Information Trust Alliance (HITRUST)1.  The study reports that from 2009 to the first half of 2012, there have been 495 medical data breaches involving 21 [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Cyber+Security,Data+Breach,Data+Security,HIPAA,HITECH+Act,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Since stricter regulations were imposed in 2009, the healthcare industry’s track record on patient <a href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">data protection and security</a> has made very little improvement according to the latest <a href="http://www.hitrustalliance.net/breachreport/HITRUST%20Report%20-%20U.S.%20Healthcare%20Data%20Breach%20Trends.pdf" class="broken_link" rel="nofollow">study</a> from Health Information Trust Alliance (HITRUST)<sup>1</sup>.  The study reports that from 2009 to the first half of 2012, there have been 495 <a href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/">medical data breaches</a> involving 21 million records costing roughly $4 billion.  Government organizations including VA hospitals accounted for the highest number of lost records and the states with the most health care data breaches are California, Texas and New York.  Since 2009 the total number of <a href="http://www.experian.com/blogs/data-breach/2012/01/25/consequences-following-a-data-breach/">data breaches</a> at hospitals and health systems decreased only slightly but increased at smaller private physician practices, which accounted for more than 60% of the 459 breaches reviewed in the study.</p>
<p> The report also found that the majority of breaches (70 percent) were electronic and the leading cause data breach incidents were due to stolen devices such as laptops and mobile media.  However, paper records still play a role in data breaches, totaling 24 percent of medical data breaches, second only to lost laptops.  Mailing errors and improper disposal of records were the main reasons for paper-based breaches. </p>
<p>The Health Information Technology for Economic and Clinical Health (HITECH) Act states that healthcare organizations have 60 days in which to notify victims about a data breach but over 50 percent of companies failed to meet this deadline after a breach.</p>
<p>And it may get worse before it gets better if the medial industry does not find a way to protect themselves from BYOD (bring your own device) policies.  BYOD has become commonplace at smaller physician offices where medical personnel commonly look up patient information on their own smartphones without sufficient encryption or passwords in place which could pose a problem in the event that the device is lost.  In addition, due to the smaller sizes of this group, they lack the resources and awareness to properly arm themselves with the proper data breach protection<strong> </strong>in all areas of their practice.<strong>  </strong>This could expose a larger problem for the entire healthcare industry since community health records and health information is often shared between medical institutions of all sizes. </p>
<p>&nbsp;</p>
<p><sup>1</sup> HITRUST is a non-profit coalition of healthcare, business, technology and information security leaders, established to insure information security is a core value in the broad adoption of health information systems and exchanges.</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/&via=Experian_DBR&text=Little progress made in the prevention of medical data breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2013%2F01%2F01%2Flittle-progress-made-in-the-prevention-of-medical-data-breaches%2F&amp;title=Little%20progress%20made%20in%20the%20prevention%20of%20medical%20data%20breaches" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2013/01/01/little-progress-made-in-the-prevention-of-medical-data-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Feds seek remedies for medical identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/#comments</comments>
		<pubDate>Tue, 13 Nov 2012 18:13:39 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1806</guid>
		<description><![CDATA[As medical data breaches continue to spike, the federal government is seeking remedies to try and prevent medical identity theft.   Nearly 21 million Americans are at risk of having their medical identities stolen after having their healthcare records exposed in data breaches.1 And that’s just since September 2009, when a new breach notification rule took [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F13%2Ffeds-seek-remedies-for-medical-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/medical-identity-theft.jpg"><img class="aligncenter size-full wp-image-1810" title="medical identity theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/11/medical-identity-theft.jpg" alt="" width="424" height="283" /></a></p>
<p>As medical data breaches continue to spike, the federal government is seeking remedies to try and prevent medical identity theft.  </p>
<p>Nearly 21 million Americans are at risk of having their medical identities stolen after having their healthcare records exposed in data breaches.<sup>1</sup> And that’s just since September 2009, when a new breach notification rule took effect and the U.S. Department of Health and Human Services (HHS) began enforcing the rule and tracking healthcare breaches.  </p>
<p>As the problem continues to worsen – theft of medical data increased by 50% last year<sup>2</sup> – the federal government is looking for ways to both stem the tide of breaches and help consumers whose medical records have been exposed.    </p>
<p>The Centers for Medicare and Medicaid Services (CMS) – which provides coverage to 100 million people &#8211; can play an important role in this effort. As the single largest healthcare payer in the nation, CMS can help consumers by responding to breaches a little quicker and by providing more information in its notifications, according to the HHS Office of the Inspector General (OIG).</p>
<p>But the OIG’s recommendations can apply to all healthcare organizations that want to help their patients, clients or employees whose personal information has been exposed due to a data breach. </p>
<p>OIG officials believe if organizations send out breach notifications on-time and provide enough information, then potential victims can take steps to protect themselves. They can be more diligent about checking their credit reports, financial statements and medical records. They can also subscribe to credit and identity monitoring services, if these services aren’t already provided to them by their organizations.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_111312_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers.</a></div></div>
<p>If everyone does their part, perhaps the healthcare industry will eventually see the tide turn on data breaches and medical identity theft.</p>
<p><sup> </sup></p>
<p><sup> </sup></p>
<p><sup>1</sup> U.S. Department of Health and Human Services Office for Civil Rights.</p>
<p><sup>2</sup> Identity Theft Resource Center</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/&via=Experian_DBR&text=Feds seek remedies for medical identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F11%2F13%2Ffeds-seek-remedies-for-medical-identity-theft%2F&amp;title=Feds%20seek%20remedies%20for%20medical%20identity%20theft" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/11/13/feds-seek-remedies-for-medical-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three things you should never do to identity theft victims</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/#comments</comments>
		<pubDate>Tue, 21 Aug 2012 18:16:31 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1555</guid>
		<description><![CDATA[Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft. In fact, 90% of the respondents in a recent study knew the definition of medical identity theft this year, [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg"><img class="aligncenter size-full wp-image-1558" title="Identity_Theft_Victim" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/Identity_Theft_Victim.jpg" alt="" width="371" height="282" /></a></p>
<p>Medical identity theft is no longer some obscure phrase spoken primarily in data security circles. It’s quickly becoming a household term for millions of Americans who’ve become a victim or know someone victimized by identity theft.</p>
<p>In fact, 90% of the respondents in a <a title="Ponemon Institute: Third Annual Study on Medical Identity Theft " href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">recent study </a>knew the definition of medical identity theft this year, compared with 77% last year, according to the Ponemon Institute.</p>
<p>Awareness of the crime, along with its number of victims, is obviously rising. But interestingly, a majority of victims are either not sure what to do or don’t do anything about having their medical identities stolen. What about your organization? Does it know what to do?</p>
<p>Here are three things you should never do if your organization experiences a data breach that puts patients or consumers at risk of identity theft:</p>
<ul>
<li>Ignore the incident thinking no one will find out</li>
<li>Take one year or longer to notify potential victims. Or even worse, don’t notify them at all if you’re not required to do so by law.</li>
<li>Don’t offer any compensation or services to help potential victims</li>
</ul>
<p>So what should you do? Here’s what people expect when their medical records are lost or stolen.</p>
<p>1)      Reimbursement for the cost of finding another provider. If you’re a doctor, this may seem worse than it actually is, as most victims take no action. But if they do leave, reimbursing them is an act of goodwill that can only benefit your organization in the long run.</p>
<p>2)      <a title="Ponemon Institute: 2012 Consumer Study on Data Breach Notification " href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">To be notified of the loss </a>or theft within 30 days. It may behoove you to be honest and forthright. Some organizations maintained the loyalty of their patients by issuing a press release and developing a website dedicated to the breach.</p>
<p>3)      To be provided with free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity protection </a>for one year.</p>
<p>The best remedy for identity theft is to avoid it altogether by taking precautions to protect data and train your staff on security measures. But if you do experience a breach that leads to identity theft, the best thing you can do is help your victims. It’s not only the right thing to do, it’s also the best way to protect your brand and reputation.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_082112_article">Download your free Data Breach Response Guide! </a></div></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/&via=Experian_DBR&text=Three things you should never do to identity theft victims&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F21%2Fthree-things-you-should-never-do-to-identity-theft-victims%2F&amp;title=Three%20things%20you%20should%20never%20do%20to%20identity%20theft%20victims" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/21/three-things-you-should-never-do-to-identity-theft-victims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Vigilance is still the best medicine for avoiding medical identity theft</title>
		<link>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/#comments</comments>
		<pubDate>Tue, 26 Jun 2012 18:09:33 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1378</guid>
		<description><![CDATA[  The latest Ponemon Institute Medical Identity Theft survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=HIPAA,Identity+Theft,Medical+Data+Breach,medical+fraud,Medical+identity+theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"> </p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg"><img class="aligncenter size-full wp-image-1402" title="Doctor conducting research" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/06/Chief-Medical-Information-Officer1.jpg" alt="" width="448" height="299" /></a></p>
<p>The latest <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">Ponemon Institute Medical Identity Theft </a>survey reflects the classic good news, bad news scenario. The good news is that more consumers understand how medical identity theft happens, and the importance of checking healthcare invoices and records for accuracy. The bad news is that the victim count has hit an all-time high (nearly 2 million annually), while breach frequency and financial damages continue<br />
to rise, unabated.   </p>
<p><strong>Losses up 44% from 2010</strong></p>
<p>Data extrapolated for 2012 reveals that losses from medical identity theft will top $40 billion, up 34% from last year and 44% from 2010. During any given hour thieves using pilfered credentials will steal nearly $5 million worth of medical services, equipment and prescriptions.</p>
<p>The survey also revealed:</p>
<ul>
<li><strong>Higher costs for recovery and resolution</strong>: victims pay on average $22,346<br />
(up 10% from 2011) to resolve medical identity theft, including the cost of identity theft protection and retaining legal counsel</li>
<li><strong>Difficulty knowing when the crime occurred</strong>: one quarter of those asked did not know when their medical identity was stolen, while 34% said it took more than a year to find out</li>
<li><strong>Collection letters still top the list</strong>: though more consumers learn of medical identity theft from suspicious statement or invoice entries, nearly 40% of victims first hear of their misfortune through collection letters</li>
</ul>
<p>In a subtle but potentially instructive revelation, just 4% of survey respondents said a healthcare provider or insurance company notified them of the theft.  </p>
<p><strong>Providers beware</strong></p>
<p>So how is all this flavoring consumers’ attitudes toward healthcare and insurance providers? The biggest non-financial consequence, according to Ponemon, is a loss of trust and confidence. If people perceive a lack of effective data safeguards, most (58%) feel no compunction about going elsewhere for services. If their medical records were ever lost or stolen 56% of respondents would also feel justified making a change.  </p>
<p><strong>Watch the vital signs</strong></p>
<p>The top three actions desired by victims following medical identity theft include: reimbursement for the costs of changing providers; <a title="Ponemon Notification Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-notification-study.jsp">prompt notification of the loss or theft</a>; and free <a title="ProtectMyID" href="http://www.protectmyid.com/" class="broken_link" rel="nofollow">identity theft protection </a>for at least one year. (Hint: Providers can use these survey insights to develop post-breach strategies and programs aimed at reestablishing trust and confidence.)  </p>
<p>Employers can also play a role in medical identity theft awareness by encouraging (and if needed, teaching) employees how to:</p>
<ul>
<li>Keep medical information private</li>
<li>Regularly check medical records for accuracy (57% of those surveyed don’t)</li>
<li>Be more proactive about monitoring statements and charges</li>
<li>Review and interpret credit reports</li>
<li>Engage an identity theft protection service</li>
</ul>
<p>Bottom line? When it comes to <a title="Ponemon Medical ID Study Download" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp">medical identity theft</a>, vigilance is good medicine&#8211;for consumers and healthcare providers alike.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_062612_article  ">View Now!</a> </div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/&via=Experian_DBR&text=Vigilance is still the best medicine for avoiding medical identity theft&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F06%2F26%2Fvigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft%2F&amp;title=Vigilance%20is%20still%20the%20best%20medicine%20for%20avoiding%20medical%20identity%20theft" id="wpa2a_8"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/06/26/vigilance-is-still-the-best-medicine-for-avoiding-medical-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Healthcare breaches &amp; fraud are here to stay</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/#comments</comments>
		<pubDate>Tue, 15 May 2012 14:49:10 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1213</guid>
		<description><![CDATA[Don’t expect medical breaches and healthcare fraud to drop off the radar anytime soon. Here’s why. First, the number of breaches in the industry is still escalating. In 2011, healthcare breaches occurred 32% more frequently than in 2010.1 Second, the profitably of medical records on the black market is high – 192% more profitable than [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg"><img class="aligncenter size-full wp-image-1224" title="electronic-medical-records" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/electronic-medical-records.jpg" alt="" width="425" height="282" /></a></p>
<p>Don’t expect <a title="The RX for medical breaches" href="http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/" target="_blank">medical breaches</a> and healthcare fraud to drop off the radar anytime soon. Here’s why.</p>
<p>First, the number of breaches in the industry is still escalating. In 2011, <a title="5 Differentiating factos of a healthcare breach" href="http://www.experian.com/blogs/data-breach/2012/04/10/5-differentiating-factors-of-a-healthcare-breach/" target="_blank">healthcare breaches</a> occurred 32% more frequently than in 2010.<sup>1</sup></p>
<p>Second, the profitably of medical records on the black market is high – 192% more profitable than Social Security numbers. Estimates put the former at $50 and the latter at $1, according to a GovTech.com article.</p>
<p>It’s this frequency and profitability that, in part, help to ensure the continuation of data loss and fraud. The sooner the industry accepts and prepares for incidents, the better.</p>
<p>Healthcare organizations still have a lot to do in that regard. Forty-three percent rank their ability to counter internal and external data security threats as “needs improvement,” “poor” or “failing.”<sup>2</sup> And their actions – or lack thereof – can adversely affect patients. Medical identity theft can cost a consumer $20,663 to resolve.<sup>3</sup></p>
<p> So what exactly is compromising data security at healthcare organizations? In a recent study, most organizations (54%) agreed that a lack of budgetary resources dedicated to security and privacy is the greatest weakness in preventing a breach.<sup>4</sup> The study also named the top three causes of data breaches as:</p>
<ul>
<li>Lost or stolen computing devices</li>
<li>Third-party errors</li>
<li>Unintentional employee actions<sup>5</sup></li>
</ul>
<p>Looking at the list, it’s clear that budgeting for security and privacy needs to encompass protecting mobile and other computing devices, training employees and verifying that third party partners uphold a high level of security as well.</p>
<p>Without a well-rounded approach to data security, organizations make themselves even more vulnerable at a time when vulnerability is a given. Organizations big and small can’t do without computers, third parties and employees – or at least two of the three. So the risk of a breach and resulting fraud can never be completely eradicated. Human error alone is impossible to eliminate.</p>
<p>But risks can be managed with a comprehensive plan that addresses a full spectrum of weaknesses and threats. A plan that includes access controls and encryption for sensitive data as well as a response guide to handling a data breach if one occurs.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_051512_article ">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. View Now! </a></div></div>
<p>[footnotes]</p>
<p>1. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
2. Healthcare Information Security Today (2011)<br />
3. Second Annual National Study on Medical Identity Theft, Ponemon Institute (2011)<br />
4. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)<br />
5. Second Annual Benchmark Study on Patient Privacy &amp; Data Security, Ponemon Institute (2011)</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/&via=Experian_DBR&text=Healthcare breaches & fraud are here to stay&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F15%2Fhealthcare-breaches-fraud-are-here-to-stay%2F&amp;title=Healthcare%20breaches%20%26%20fraud%20are%20here%20to%20stay" id="wpa2a_10"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/15/healthcare-breaches-fraud-are-here-to-stay/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Medical and mobile: Convenience trumps security</title>
		<link>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/#comments</comments>
		<pubDate>Wed, 02 May 2012 16:30:56 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[PHI]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1177</guid>
		<description><![CDATA[Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too. A recent study suggests that adopting new [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,healthcare,healthcare+data+breach,HIPAA,Medical+Data+Breach,medical+fraud,PHI&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg"><img class="aligncenter size-full wp-image-1183" title="medicalmobileapps" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/05/medicalmobileapps.jpg" alt="" width="540" height="270" /></a></p>
<p>Say goodbye to bulky manila folders. Today’s healthcare organizations are zipping through medical histories and writing prescriptions using mobile devices. But the new found convenience hasn’t been without cost – not just in implementing new systems and tools but in losing data when security measures aren’t implemented too.</p>
<p>A recent study suggests that adopting new technology is a far greater priority than securing it. Eighty-one percent of healthcare organizations are using mobile devices to “collect, store and/or transmit” protected health information (PHI) but 49% “do nothing” to protect the devices.</p>
<p>The lack of security has been detrimental. The same study found that the breach of protected health information (PHI) records increased 97% from 2010 to 2011.</p>
<p>While data loss is certainly a burden to organizations, mobile security doesn’t have to be. Here are four key considerations for mobile-equipped medical offices:</p>
<ol>
<li>Encryption<br />
Consider the <a title="Encryption: Data's best friend" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/">encryption</a> capabilities of a device before you purchase, not after. Carefully choose tablets and phones that offer a high level of encryption across the various functions and facets, including removable storage, of the device. If your office is already mobile-equipped, be sure encryption is standard procedure.</li>
<li>Storage<br />
Think of a mobile device as a way to access data, not store it. A secure server or cloud network is more appropriate for a centralized storage location, to which your mobile devices can connect and disconnect. The latter function is essential, as the portability of a mobile device makes it both easier to lose and more attractive to thieves. According to the Department of Health and Human Services, stolen physical devices account for 71% of breached healthcare records. A missing device that’s online with your data bank poses a serious threat to you and your patients.</li>
<li>Access<br />
Mobile devices should be password-protected, and so should access to your data bank through the devices. Job requirements should determine what devices and passwords each employee in your office can access. Also consider whether bring your own device (BYOD), when employees use their personal devices to access work data, fits with your security approach.</li>
<li>Employees<br />
Don’t overlook the element of human error in your mobile security plan. In 2011, the volume of breached medical records resulting from an employee losing an unencrypted device jumped 525%. Since you can’t ever completely eliminate human error, be sure to train your <a title="Your biggest data breach risk may be on your payroll " href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/">employees </a>on properly using and handling mobile devices, as well as reporting any loss, theft or signs that a device has been tampered with.</li>
</ol>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff">Webinar Download: Healthcare Information Security Today conducted a survey to provide an in-dpeth assessment of the effectiveness of data protection efforts. <a title="Healthcare Info Security Webinar" href="http://www.experian.com/innovation/business-resources/cyber-insurance-data-breach-response-plan.jsp?WT.srch=ecd_dbres_blog_050212_article ">View Now! </a></div></div>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/&via=Experian_DBR&text=Medical and mobile: Convenience trumps security&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F05%2F02%2Fmedical-and-mobile-convenience-trumps-security%2F&amp;title=Medical%20and%20mobile%3A%20Convenience%20trumps%20security" id="wpa2a_12"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/05/02/medical-and-mobile-convenience-trumps-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Where will you be on April 29, 2012?</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/#comments</comments>
		<pubDate>Fri, 27 Apr 2012 15:30:00 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[data breach response]]></category>
		<category><![CDATA[healthcare data breach]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1140</guid>
		<description><![CDATA[﻿ Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=data+breach+response,healthcare+data+breach,HIPAA,medical+fraud,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;">﻿</p>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg"><img class="size-full wp-image-1143" title="Caesars Palace in Las Vegas" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/caesars-palace-las-vegas.jpg" alt="" width="512" height="340" /></a></p>
<p style="text-align: left;">Experian will be at the annual HCCA 2012 Compliance Institute conference at Caesar’s Palace in Las Vegas. This conference offers an important opportunity to meet industry professionals with solid credentials in a number of areas related to medical information and data security. Some of the topics to be addressed at the conference include healthcare reform, compliance effectiveness and HIPAA privacy/data breach.</p>
<p>Attendees at the Compliance Institute can choose from 128 sessions and 225 speakers. Special conference tracks address legal and regulatory issues and privacy and security concerns, as well as general compliance. Also offered are advanced discussion groups, industry immersions, speed networking and more. For more information, go to <a rel="nofollow" href="http://www.compliance-institute.org/" class="broken_link">http://www.compliance-institute.org/</a>.</p>
<p>Come and visit our booth. We’ll talk about ProtectMyID<sup>®</sup>, Surveillance Alerts<sup>TM</sup> and ProtectMyID<sup>®</sup> ExtendCARE<sup>TM</sup>, as well as other Experian products that can play a critical role in protecting your organization, informing patients of a data breach and helping your organization recover from an incident. You can also enter your name in a drawing for a chance to win a new iPad.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/&via=Experian_DBR&text=Where will you be on April 29, 2012?&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F27%2Fwhere-will-you-be-on-april-29-2012%2F&amp;title=Where%20will%20you%20be%20on%20April%2029%2C%202012%3F" id="wpa2a_14"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/27/where-will-you-be-on-april-29-2012/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The RX for medical breaches</title>
		<link>http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/#comments</comments>
		<pubDate>Tue, 03 Apr 2012 17:21:33 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1116</guid>
		<description><![CDATA[It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable to hackers, fraudsters, and costly bad luck (such as when a lost portable hard drive exposes the personal health records of thousands of patients.) The threat is real, so how do [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F03%2Fthe-rx-for-medical-breaches%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,HIPAA,Medical+Data+Breach,medical+fraud&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><strong><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/MedicalData.jpg"><img class="aligncenter size-full wp-image-1119" title="MedicalData" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/04/MedicalData.jpg" alt="" width="536" height="352" /></a></strong></p>
<p>It’s no secret that healthcare data breaches are steadily on the rise.  As technology has modernized healthcare, it has also made healthcare more vulnerable to hackers, fraudsters, and costly bad luck (such as when a lost portable hard drive exposes the personal health records of thousands of patients.)</p>
<p>The threat is real, so how do security experts suggest you protect yourself?</p>
<p>According to GovInfoSecurity, here are 8 tips to help ward off healthcare security breaches:</p>
<p>1. Risk Assessments<br />
HIPAA security risk analysis has been in short supply, thus exposing personal health information to the vagaries of chance.  Many large healthcare breaches have involved the loss or theft of mobile devices and media containing unencrypted PHI, pointing to the fact that risk assessments were not conducted or had failed to identify mobile devices as a vulnerability.  Comprehensive assessments should take into account internal and external infrastructure, web applications and wireless security, and mobile device policies and employee training should be conducted for all healthcare organizations.</p>
<p>2. Encrypt Mobile Devices and Media<br />
<a title="Data encryption_DB blog" href="http://www.experian.com/blogs/data-breach/2011/07/12/encryption-data%E2%80%99s-best-friend/" target="_blank">Data encryption</a> is important in every setting, and this is especially true when it comes to healthcare data.  Further, some experts think that health organizations should go further than encryption and simply not allow patient data to be stored on <a title="How memory sticks can lead to data breaches" href="http://www.experian.com/blogs/data-breach/2011/08/30/lost-memory-how-memory-sticks-can-lead-to-data-breaches/" target="_blank">mobile devices </a>at all.</p>
<p>3. Increase Training<br />
Security policies alone are not enough.  Employees must be trained in these policies in order for them to be effective.</p>
<p>4. Conduct Internal Audits<br />
<a title="Your biggest data breach risk may be on your payroll" href="http://www.experian.com/blogs/data-breach/2011/10/25/your-biggest-data-breach-risk-may-be-on-your-payroll/" target="_blank">Internal breach threats</a> can be mitigated by the establishment of regular internal audits, which can deter would-be fraudsters while also identifying <a title="Insider fraud" href="http://www.experian.com/blogs/data-breach/2011/06/21/scam-report-insider-fraud/" target="_blank">internal breaches </a>before they snowball further.</p>
<p>5. Monitor Business Associates<br />
With business associates accounting for 22% of major breaches, it’s important to make sure that vendor partners are as security conscious as you are.  Audits should extend to business associates in order to ensure vendors are practicing agreed-upon security measures.</p>
<p>6. Limit Data Storage<br />
Massive unencrypted databases are a recipe for disaster.  Encryption is important, but addressing the size of databases is also relevant.  Limiting the amount of personal data your organization possesses is an important step in ameliorating the consequences of data breaches.</p>
<p>7. Paper Records Are Also Important<br />
Good old-fashioned paper records can also lead to data breaches, so amidst the focus on online threats don’t forget about the hazards of paper.</p>
<p>8. Address Other Vulnerabilities<br />
Weaknesses such as wireless access vulnerabilities, ineffective encryption, rogue wireless access points, firewalls separating wireless networks from internal wired networks, and authentication requirements for entering wireless networks are examples of breach threats hat fall into the “miscellaneous” category.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Ponemon Third Annual Medical Identity Theft Study" href="http://www.experian.com/innovation/business-resources/ponemon-third-annual-medical-id-theft-study.jsp?WT.srch=ecd_dbres_blog_040312_article">Download the Ponemon Medical Identity Theft Study to learn the costly consequences facing patients and providers</a>.</div></div>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/&via=Experian_DBR&text=The RX for medical breaches&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F04%2F03%2Fthe-rx-for-medical-breaches%2F&amp;title=The%20RX%20for%20medical%20breaches" id="wpa2a_16"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/04/03/the-rx-for-medical-breaches/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A billion dollar crime that needs an urgent response</title>
		<link>http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/#comments</comments>
		<pubDate>Tue, 19 Apr 2011 15:22:18 +0000</pubDate>
		<dc:creator>lponemon</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=501</guid>
		<description><![CDATA[According to Ponemon Institute’s Second Annual Survey on Medical Identity Theft, we estimate that more than 1.49 million Americans have been targeted by this crime. With an average cost per victim of $20,663 the total national economic impact of medical identity theft crimes is more than $30 billion.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F04%2F19%2Fa-billion-dollar-crime-that-needs-an-urgent-response%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Security,Identity+Theft,Identity+Theft+Prevention,Medical+Data+Breach,medical+fraud,Medical+identity+theft,Ponemon+Institute&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><em><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/HealthCare-Medical-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-504" title="HealthCare Medical Identity Theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/04/HealthCare-Medical-Identity-Theft.jpg" alt="" width="400" height="300" /></a></em></p>
<p><em>Our guest blogger this week is Dr. Larry Ponemon, Chairman and Founder of the </em><em><a rel="”nofollow” nofollow" href="http://www.ponemon.org/management" target="_blank" class="broken_link"><em>Ponemon Institute</em></a></em><em>.</em><em></em></p>
<p><em>Join us on Tuesday, April 26th for a live webinar with Dr. Larry Ponemon presenting </em><em><a href="http://www.bulldogsolutions.net/ExperianDataBreach/EXT1008/frmRegistration.aspx?bdls=27679" target="_blank" class="broken_link" rel="nofollow"><em>Medical Identity Theft Trends: The Importance of Securing Healthcare Data</em></a></em><em>. </em></p>
<p>What are some of the dire consequences of medical identity theft? It could be the shock of receiving a collection letter requesting immediate payment for an expensive medical procedure you never had. Or, it might result in a mistake on your healthcare record that could threaten insurance coverage or worse yet cause you to receive the wrong medical treatment.</p>
<p>According to Ponemon Institute’s <em>Second Annual Survey on Medical Identity Theft</em>, we estimate that more than 1.49 million Americans have been targeted by this crime. With an average cost per victim of $20,663 the total national economic impact of medical identity theft crimes is more than $30 billion.</p>
<p>Why is medical identity theft on the rise? First, we found that consumers lack awareness about this crime, which could make them more complacent and more vulnerable. Second, medical identity theft is often a family affair. More than one-third of victims in our study say that it was a family member who took their personal identification credentials. Finally, the victims tend to be older with a greater likelihood of having Medicare and other Social Security benefits. They also may not be as savvy about the need to protect their medical identity.</p>
<p>Consumers can minimize their risk by safeguarding their medical credentials and making sure they provide sensitive information only to appropriate healthcare organizations that take the security of health records seriously. Consumers also should monitor health records and credit reports to make sure that if their identity is stolen the incident can be resolved as soon as possible. In turn, <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank">organizations have a responsibility</a> to protect patients’ records from being lost or stolen and to inform consumers of the need to safeguard their medical credentials. Taking such steps is critical to reducing this billion-dollar crime.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/&via=Experian_DBR&text=A billion dollar crime that needs an urgent response&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/04/19/a-billion-dollar-crime-that-needs-an-urgent-response/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Consumers yawn at healthcare fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/#comments</comments>
		<pubDate>Tue, 29 Mar 2011 16:22:53 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Fraud Resolution]]></category>
		<category><![CDATA[Healthcare Breach]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Consumer Privacy]]></category>
		<category><![CDATA[Medical Data Breach]]></category>
		<category><![CDATA[medical fraud]]></category>
		<category><![CDATA[Medical identity theft]]></category>
		<category><![CDATA[National Study on Medical Identity Theft]]></category>
		<category><![CDATA[Ponemon Institute]]></category>
		<category><![CDATA[ProtectMyID]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=404</guid>
		<description><![CDATA[Today's headlines trumpet yet another high-profile medical data breach, this time through Health Net.  This corporate catastrophe reminds us of the increasing hazard of medical fraud, which is the most expensive and time consuming to resolve of all types of identity theft .  The second annual National Study on Medical Identity Theft, fielded by the Ponemon Institute provides further insight into this pervasive problem and how it affects consumers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F03%2F29%2Fconsumers-yawn-at-healthcare-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Consumer+Privacy,Medical+Data+Breach,medical+fraud,Medical+identity+theft,National+Study+on+Medical+Identity+Theft,Ponemon+Institute,ProtectMyID&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Medical-Identity-Theft.jpg"><img class="aligncenter size-full wp-image-415" title="Medical Identity Theft" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/03/Medical-Identity-Theft.jpg" alt="" width="500" height="301" /></a></p>
<p>Today&#8217;s headlines trumpet yet another <strong><a rel="”nofollow” nofollow" href="http://latimesblogs.latimes.com/money_co/2011/03/health-net-inc-security-lapse-leads-to-loss-of-personal-information-for-nearly-2-million-current-and.html" target="_blank" class="broken_link">high-profile medical data breach</a></strong>, this time through <strong><a rel="”nofollow” nofollow" href="https://www.healthnet.com/portal/home.do" target="_blank" class="broken_link">Health Net</a></strong>.  The company&#8217;s nine missing computer drivers have exposed the records of 2 million policyholders, thus compromising personal information that includes addresses, Social Security numbers, financial data and other information about customers, employees and healthcare providers.  California insurance regulators are conducting <strong><a rel="”nofollow” nofollow" href="http://www.latimes.com/business/la-fi-0316-health-net-records-20110316,0,1660184.story" target="_blank" class="broken_link">multiple probes</a> </strong>to determine whether Health Net, which services 6 million policyholders nationwide, &#8220;did everything it could have done to avoid and appropriately remedy this security breakdown.&#8221;</p>
<p>This corporate catastrophe reminds us of the <strong><a href="http://www.experian.com/blogs/data-breach/2010/09/07/warning-medical-data-breaches-are-on-the-rise/" target="_blank">increasing hazard of medical fraud</a></strong>, which is the <strong><a href="http://www.experian.com/data-breach/wp-global-privacy-summit-presentation.html" target="_blank">most expensive and time consuming to resolve</a> </strong>of all types of identity theft[i].  The second annual National Study on Medical Identity Theft, fielded by the Ponemon Institute provides further insight into this pervasive problem and how it affects consumers.</p>
<p>Key finding include:</p>
<p><strong>Recognizing the importance of privacy does not equate to action:</strong></p>
<ul>
<li>Nearly 1.5 million Americans have been affected by medical identity theft</li>
<li>The average cost to resolve a case of medical identity theft is $20,663, up slightly from $20,160 in 2010</li>
<li>Nearly 70% of total respondents felt it is important to have personal control over medical records</li>
<li>Nearly 80% felt that <a href="http://www.experian.com/blogs/data-breach/2010/12/15/what-a-healthcare-business-can-do-to-prevent-medical-fraud/" target="_blank">healthcare organizations should ensure the privacy of personal medical records</a></li>
<li>Nearly half (49%) of past medical identity theft victims took no new steps to protect themselves after their own incident</li>
<li>50% of respondents did not report the incident to law enforcement or other legal authorities, up from 46% in 2010</li>
</ul>
<p><strong>Consumer indifference is fueled by lack of understanding of repercussions</strong></p>
<ul>
<li>Of those that failed to report an incident, 43% cited the lack of resulting harm and the desire to “not make it a big deal.” This is up from 37% in 2010</li>
<li>37% of respondents fear embarrassment as a result of medical identity theft more than loss of medical coverage (21%) or a diminished credit score (18%)</li>
</ul>
<p><strong>Consumers are uninformed of new healthcare reform policies</strong></p>
<ul>
<li>More than half of respondents (55%) are not familiar or have no knowledge of the <a rel="”nofollow” nofollow" href="http://www.healthcare.gov/" target="_blank" class="broken_link">new healthcare reform policies</a></li>
<li>79% are not aware of the plan to create a national electronic database of American’s health information</li>
<li>33% of respondents believe that a national electronic database will increase the risk of medical ID theft</li>
</ul>
<p><strong>Medical identity theft is a family affair</strong> <strong> </strong></p>
<ul>
<li>In many cases, the victim discovers the thief to be a relative and the crime is often not reported to authorities</li>
<li>The leading instance of medical identity theft was at the hands of a family member, accounting for 36% of all victim responses, making it the most common scenario by an overwhelming margin</li>
<li>According to 51% of respondents, the number one reason for not reporting the incident after discovery is because the victim knew the thief and did not want to report him or her</li>
</ul>
<p>Health Net is conducting its own investigation into its recent data breach, and regulators have praised the company for acting quickly to alert consumers about the incident.  Healthcare organizations are responsible for <a href="http://www.experian.com/data-breach/wp-about-medical-identity-theft-overview.html" target="_blank">protecting consumer privacy and reporting breaches</a>, but the National Study on Medical Identity Theft&#8217;s survey confirms that consumers need to play their own part in reporting incidents and helping healthcare companies protect private medical information.</p>
<hr size="1" />
<p>[i]2010 Global Privacy Summit Presentation: The Potential Damages and Consquences of Medical Identity Theft and Healthcare Data Breaches – Dr. Larry Ponemon</p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/&via=Experian_DBR&text=Consumers yawn at healthcare fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/03/29/consumers-yawn-at-healthcare-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>