
Medical ID Theft
August 16th, 2019 - NamasCategories: Acupuncture|Alternative Allergy|Immunology Anesthesia|Pain Management Audits/Auditing Behavioral Health|Psychiatry|Psychology Billing Cardiology|Vascular Chiropractic Dental Dermatology|Plastic Surgery Endocrinology ENT|Otolaryngology Gastroenterology HIPAA|PHI Home Health|Hospice Interventional Radiology Laboratory|Pathology Medical Records Neurology|Neurosurgery Obstetrics|Gynecology Oncology|Hematology Ophthalmology Optometry Oral and Maxillofacial Surgery Orthopedics Pediatrics Physical Medicine|Physical Therapy Podiatry Practice Management Primary Care|Family Care Pulmonology Radiology Rheumatology Skilled Nursing Urology|Nephrology
Medical ID Theft
"So, do you guys think you can do something with that?" John asked angrily at our first meeting with him in August 2017 as he slammed a stack of medical bills, EOBs and collection letters - three inches high - down in front of my partner and I. For the next 20 minutes, John explained to us how his nightmare began with the first collection letters for medical procedures he had never received, from hospitals and doctors' offices that he had never visited. He told us about the ongoing arguments with bill collectors who insisted that he "pay his bills" when in fact, he had never been treated at any of these facilities. The response from the collectors was always the same: "Is this your name, address, Social Security Number, medical insurance ID, driver's license number? Pay your bills!"
John likens his experience to a game of "Whack-a-Mole." "Every time I think I have it resolved, it pops up again in another place," he said. "I just can't get it stopped!"
This is the face of medical identity theft. As crazy as John's story sounds, this is actually how many cases of modern identity theft play out. We have been taught by TV, radio, and social media ads that identity theft is about credit cards and bank accounts, but recent statistics show that huge data breach attacks have not targeted credit card numbers. When your credit card is stolen, your bank quickly jumps on it and changes your credit card numbers. However, when a thief steals the personal identifiers that establish your identity online, they can literally "be you" for any reason they need you. And where is there more information available about you than in your medical records?
Think about the information your medical insurance carrier or local hospital has about you and your family: name, address, dates of birth, Social Security Numbers, driver's license numbers (for you and possibly your family members). What more would I need to "be you" to get medical services, purchase a car, buy a house, or commit a crime in another state, all in your name? This is why medical identities are the most highly prized targets, with a complete medical record being worth as much as $1,200 on the "Dark Web."
By the way, it is always about the money for the identity thief! Let's just get that out of the way. They make money by assembling information on real people and then selling complete sets of identifiers to individuals who want to operate as other people. When someone gets control of your digital identifiers, such as those found in your medical records, financial losses may be the least of your problems.
In John's case, his identity had been used to obtain drivers' licenses, receive medical services, and commit multiple minor crimes. Some of the damage required the assistance of attorneys and investigators who understood these problems. Keep in mind that John had to deal with these issues on his own for about 13 years before we met him.
What is the good news in all of this? You now know where the danger is and that much of the identity theft problem is simply a result of the technology we all carry in our pockets; and we never advocate giving up the technologies that have made our lives better. Instead, we advocate putting good protection in place. When you look at protecting you and your family, just as you would with car or homeowners insurance, make sure you protect what really matters. For instance, you would never purchase car insurance that wouldn't actually cover car repairs, or homeowner's insurance that wouldn't pay to rebuild the house after a covered incident. Likewise, when you shop for identity theft protection, make sure it does two things very well:
- Monitors the things that matter such as your driver's license (at all state Department of Motor Vehicles), passports, medical IDs, changes of address (at the post office), and county
court houses to make sure you know when suspicious activity happens. - Offers "Power of Attorney" restoration services by experienced investigators who do this for a living.
We call it "find it and fix it" protection. WARNING: Not all identity theft protection is the same, so read the fine print. If your coverage offers these two protections, you'll be in good hands when an identity thief strikes.
###
Questions, comments?
If you have questions or comments about this article please contact us. Comments that provide additional related information may be added here by our Editors.
Latest articles: (any category)
Reporting Modifiers 76 and 77 with ConfidenceApril 18th, 2023 - Aimee Wilcox
Modifiers are used to indicate that a procedure has been altered by a specific circumstance, so you can imagine how often modifiers are reported when billing medical services. There are modifiers that should only be applied to Evaluation and Management (E/M) service codes and modifiers used only with procedure codes. Modifiers 76 and 77 are used to identify times when either the same provider or a different provider repeated the same service on the same day and misapplication of these modifiers can result in claim denials.
Five Documentation Habits Providers Can Use Implement to Improve Evaluation & Management (E/M) ScoringApril 11th, 2023 - Aimee Wilcox
Provider education on E/M coding updates is vital to the success of any organization, but how do you whittle down the massive information into bite-sized pieces the providers can learn in just a few minutes? Check out the five steps we have identified to teach providers in just a few minutes that can significantly impact and improve coding outcomes.
Second Quarter 2023 Updates are Different This YearApril 6th, 2023 - Wyn Staheli
The second quarter of 2023 is NOT business as usual so it is important to pay attention to ensure that organizational processes and training take place to avoid mistakes. Not only have ICD-10-CM coding updates been added to the usual code set updates (e.g., CPT, HCPCS, ICD-10-PCS), but the end of the COVID-19 Public Health Emergency will bring about changes that will also take place during the quarter (but not on April 1, 2023.
7 Measures Developed by the HHS Office of Inspector General (OIG) to Identify Potential Telehealth FraudMarch 28th, 2023 - Aimee Wilcox
A recent review of telehealth services reported in Medicare claims data during the pandemic where these seven measures for identifying suspected fraud, waste, and abuse were applied, revealed more than a thousand Medicare providers potentially committed fraud during this period. What are the measures the OIG applied during their review, and how will that impact future telehealth guidelines moving forward?
MUEs and Bilateral IndicatorsMarch 23rd, 2023 - Chris Woolstenhulme
MUEs are used by Medicare to help reduce improper payments for Part B claims. This article will address the use of the National Correct Coding Initiative (NCCI) and Medically Unlikely Edits (MUEs) and how they are used by CMS.
It is True the COVID-19 PHE is ExpiringMarch 16th, 2023 - Raquel Shumway
The COVID-19 PHE is Expiring, according to HHS. What is changing and what is staying the same? Make sure you understand how it will affect your practice and your patients.
Billing Process FlowchartMarch 2nd, 2023 -
The Billing Process Flowchart (see Figure 1.1) helps outline the decision process for maintaining an effective billing process. This is only a suggested work plan and is used for demonstration purposes to illustrate areas which may need more attention in your practice’s policies and...