This website uses cookies to ensure you have the best experience. Learn more

Medical Identity Theft Essay

1857 words - 7 pages

It was a normal day at the Intern site, until a specific individual walked through the door. The client walked up to the front desk and stated that he has a new insurance card for me to copy. Rhonda Spence, the Office Manager gave him a look as if something was wrong. She leaves the office and states to the therapist that the client is using an insurance card that is not his. The therapist takes the client back to his office and informs him that he is suspected of identity theft. The client does not have health insurance, but his twin brother does. He was using his twin brother’s insurance card to receive behavioral health services. The twin brother is not aware of the situation.
The client recognized the consequences of his actions. The law enforcement officials were called and he was arrested. The fraud investigators discovered that the individual has been receiving health care services at several different clinics with thousands of dollars in outstanding medical bills. Currently, he is being charged with medical identity theft and if found guilty he can be sentenced up to fifteen years of imprisonment, a fine, and pay restitution. As for the victim, more than likely he will not be responsible for paying the bills that the thief created. However, he will be left with a precarious credit situation, and he will deal with the emotional stress of regaining his good name. Medical identity theft is becoming a growing problem in the community. It is not only the fastest growing crime in the United States, but also the leading consumer fraud complaint in the country. There are several ways that identity theft is committed around the world. Identity thieves may target one individual or acquire personal information from thousands of people. It is important to understand what it is, why it happens, how, who it involves, what can be done to prevent it, and what to do if you become a victim.
Medical identity theft is described as the unlawful use of someone else’s personal information to get medical services or to make fake claims for medical services (Mancilla and Moczygemba, n.d.). Medical identity theft can be divided into three categories. One category type is using personal information and using the health coverage of an insured person. The second category consists of a medical facility worker mistreating privacy privileges to get a patient’s health insurance information, and then sell the health policy information or use it to submit false bills to the insurance company.
Statistics emphasize the extent of the problem. In 2006, The Federal Trade Commission completed a survey and found that 2.5 percent of the adult population in the United States reported being victims of medical identity theft. The survey also discovered the rate at which medical identity theft happens with individuals who are family. As what happened during my internship, family theft is the third category of identity theft. Family related theft accounts for 40 percent of...

Find Another Essay On Medical Identity Theft

Internet - Disclosure of Personal Information On-line and Identity Theft

1870 words - 7 pages social insurance number, and uses that information to open bank accounts, order merchandise, borrow money or take over one’s personal identity.2 For example, Adam S. Marlin of CNN interviewed a family physician that had recently been a victim of identity theft. Ignacio Ramirez of San Diego, California, received a telephone call last February from a Boston medical-equipment supplier demanding $85,000 for purchased medical supplies. Ramirez

Internet Fraud and Identity Theft Essay

1210 words - 5 pages Internet Fraud and Identity Theft The Internet is not just a medium for information; it is a tool for communication. Creating a new social sphere and environment, the Internet allows virtually anyone to be a participant. Chat rooms, discussion boards, instant messaging services and e-mail are all mediums that allow individuals to engage in communication. However, although the Internet is a public domain, individuals do not have to honestly

Identity Theft

1907 words - 8 pages company will not request you enter personal information through an email. The FTC suggest that you open another internet browser and type in, (not paste in) the company email address. Also be careful about opening email attachments, they could contain virus. You should also report any phishing scams to , in addition notify the company that was impersonate in the email you received. Types of Identity Theft Medical identity theft is

Fraud: Early Warning Signs of Fraud

2467 words - 10 pages fraud out there. You have Medicare fraud, internet fraud, mortgage fraud, loan fraud, tax fraud, embezzlement, forgery, insurance fraud, and marriage fraud. These are only a few types of fraud. There are many more types of fraud out there and new types of fraud are being committed every day. This paper will focus on different types of fraud. The different types that will be discussed are physician identity theft, medical identity theft, corporate

Identity Theft in Our Contemporary Society

2949 words - 12 pages review of identity theft based on his tenure as an investigator and research he has performed. Within his handbook, he systematically describes the wide variety of methods attackers may use to obtain an individual’s identity such as stealing mail, "washing" checks, employing credit card "skimmers", and stealing identities from older sites with minimal security functions such as medical facilities. Later, the text captures the criminal justice

Ethics in the Army

740 words - 3 pages many individuals that have been victim to identity theft, and the individuals that stole their information were friends and peers of theirs. Even with the discipline and emphasis that we place on morals and ethics, not everyone in the military thinks that way. Utilitarianism and deontological ethics help to explain this informational privacy dilemma.Utilitarianism ethics most effectively explains why we depend on the use of Social security

Home Computers; our greatest weakness in the fight against identity theft

659 words - 3 pages out in his trash. Yet the doctor was charged with a $115,000.00 bill for medical equipment he never even purchased. The resulting investigation revealed that his social security number and credit card information were stolen from a small file saved on his home computer. Because the doctor failed employ a personal firewall on his home computer, his financial record is now tarnished. Law enforcement officials consider online identity theft the

Organizational Ethics

1844 words - 7 pages contracting with employers on the front-end of identity theft. Some of the benefits offered to Europ Assistance customers are: a complete resolution program, full resolution services which include assistance with medical identity, immediate credit card cancellation and replacement requests, credit bureau notification and alert activation, credit reports and ongoing credit monitoring, fraud monitoring, and legal advice for uncooperative creditors

Why Shouldn't Companies Collect Information

1135 words - 5 pages are invading people’s privacy, information bought from data brokers can be used to harm others, and many cases of identity theft can occur. Collecting personal data about people is an invasion of privacy. Certain personal info such as birthday, age, social security numbers, license plates. and gender should be kept out of reach. According to the American Civil Liberties Union, in Jersey City (with a population of 250,000), 10 million license

Identity Fraud. What is it? How does it impact over 33 Million Victims since 1990? How does a person protect themselves from it?

2584 words - 10 pages What is Identity Fraud?In the year 2002 alone there has been a total of 161,819 reported cases of Identity Theft according to the Federal Trade Commission. According to Consumer Reports, "Identity theft [is] the fraudulent use of your name and identifying data by someone else to obtain credit, merchandise, or services". Identity Fraud does not discriminate; it affects all races, ages and classes. The actual number of Identity Theft victims

SSN America the Free?

1328 words - 5 pages purposes.Computer records have replaced paper filing systems in most organizations. Since more than one person may share the same name, accurate retrieval of information works best if each file is assigned a unique number. We should just all replace our names with our numbers. Many businesses and government agencies believe the social security number is made for this purpose. However, with the rise in the crime of identity theft and other illegitimate uses of

Similar Essays

Identity Theft Hurting Americans Essay

997 words - 4 pages “Identity theft can affect your entire life, from your financial health to your medical health” (Daver HIT). Identity theft has affected over millions of Americans over the past year making it a serious issue in the United States. It has also destroyed many people’s financial and medical insurance. Identity theft has tooken life out the victim’s who have suffered from it emotionally. For many years thieves have used the victim’s information to

Identity Theft In America Essay

1525 words - 7 pages all the victims of identity theft, about 16% know the criminal who is involved (Chappell 9). In addition to mental health, medical health may be at risk also. According to Kiesbye, “1 in 23 identity theft victims is a victim of medical identity theft” (Kiesbye 21). Because this form of the crime is growing today, many risks grow with it. “Total identity theft” is a term used to describe a form of this crime where the thief pursues further than

Definition Of White Collar Crime Essay

1534 words - 6 pages describe the expansiveness of the crime, identity cloning, criminal identity theft, medical identity theft, synthetic identity theft, child identity theft, and financial identity theft. The simple definition for criminal theft is posing as someone else when arrested for breaking the law, financial theft is using a person’s identity to get his or her credit and services, identity cloning is taking someone’s identity and assuming it in everyday life

Identity Theft And Possible Risk In Technology

1977 words - 8 pages % businesses and 34.7% health and medical (Identity Theft Resource Center 2013). The number of identity theft varies from physical possession to digital possession. At least one-fifth of trash cans contains papers listing people’s credit card number and personal information. People that throw away their trash mails contain much personal information that is useful to steal someone's identity (Davis, 2002). Technology becomes a need where people use it