SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Understanding and Preventing Provider Medical Identity Theft
Content Summary

Providers and beneficiaries of Medicare and Medicaid are at risk for medical identity theft.
The Centers for Medicare & Medicaid Services (CMS) is working to raise awareness among
providers and help them protect their medical identities.
This booklet outlines the scope and definition of medical identity theft, common schemes using
stolen identities, consequences for victims, mitigation strategies, and appropriate actions for
potential victims of medical identity theft. The booklet provides examples of adjudicated
criminal cases involving stolen provider medical identities and pragmatic approaches they
can use to protect themselves against medical identity theft.
Proactive approaches include managing enrollment information with payers, monitoring
billing and compliance processes, controlling unique medical identifiers, and engaging
patients so they are aware of the risks of medical identity theft. No one wants to be a victim
of medical identity theft. Providers can use several strategies to protect against it.

2
Medical Identity Theft Scheme
On February 16, 2012, the ringleader of an illegal prescription drug operation in New York received consecutive
prison sentences totaling between 4 and 8 years. In addition to prison, she is required to pay the New York State
Medicaid program more than $200,000 for forging more than 250 prescriptions for narcotics. Between 2009 and
2011, she wrote prescriptions using stolen prescription paper obtained from doctors and hospitals in the New
York City area. She wrote some of the prescriptions by hand and created others digitally. At the time of her arrest,
she had enough paper to write an additional 1,500 prescriptions. Also found was a special printer used to process
thermal prescriptions. According to law enforcement, “The scope and reach of [her] profit-making operation
was significant. As the ringleader, she worked with multiple co-conspirators to create prescriptions in the names
of real Medicaid recipients. Working with another group of co-conspirators, she then arranged for the forged
prescriptions [using physician medical identifiers] to be filled at pharmacies throughout the state.”1 The theft and
misuse of physician and beneficiary medical identifiers was central to this scheme and cost the healthcare system
more than $200,000.

The Scope of Medical Identity
Medical identity theft is a growing and costly issue. Physicians, other providers, and their patients are vulnerable
to it. It is defined as “the appropriation or misuse of a patient’s or [provider’s] unique medical identifying
information to obtain or bill public or private payers for fraudulent medical goods or services.”2 This type of
theft is one of several forms of healthcare fraud. The Federal government, in conjunction with State governments,
provides healthcare coverage for 100 million people through Medicare, Medicaid, and the Children’s Health
Insurance Program,3 which is equivalent to about one out of every four individuals in this country, and amounts
to expenditures of more than $635 billion in taxpayer dollars per year.4 The very size of these healthcare programs
makes them targets for fraud. Both the Federal Trade Commission (FTC) and the Centers for Medicare & Medicaid
Services (CMS) track cases of provider and patient medical identity theft. The latest FTC data show that more
than 3,600 physician and patient cases of medical identity theft were reported in 2009, with more than 12,000
cases reported between 2007 and 2009.5

Common Medical Identity Theft Schemes
All providers are at risk for medical identity theft. Criminals use two major approaches to bill fraudulent claims
with stolen medical identities. In the first approach, provider medical identifiers are used to make it appear
as if providers ordered or referred patients for additional health services, such as durable medical equipment
(DME), diagnostic testing, or home health services.6 For example, on February 9, 2012, the co-owner of a DME
company in Texas was sentenced to 99 months in Federal prison for routinely billing Medicaid for medicallyunnecessary supplies never delivered to beneficiaries. The owner used stolen beneficiary and physician medical
identifiers to bill claims totaling more than $2 million.7 In the second approach, provider medical identifiers are
used to make it appear that a physician provided and billed services directly. On January 5, 2012, a woman in
Florida was sentenced to prison for using a New York physician’s medical identifiers from April 2004 through
March 2007 to bill services never rendered. She billed the services to a Medicare Part B carrier in New Jersey.
The physician did not know the perpetrator, never saw any of the patients, and did not give permission to use
his identity.8

Understanding and Preventing Provider Medical Identity Theft

3
Consequences of Medical Identity Theft
It can take months, sometimes years before medical identity theft is recognized. A provider’s first awareness of a
stolen medical identity may come in the form of a notice of overpayment from an insurance program demanding
immediate repayment or as a notification from the Internal Revenue Service (IRS). For example, if the IRS receives
notification that a provider of record has earned income for services rendered when those services were never
reported on required tax documents, that provider may be the recipient of tax forms for income never received
with a demand for payment. Responding to overpayment demand letters, responding to IRS notification letters,
and correcting credit issues that can arise from medical identity theft are among the many potential consequences
a provider may face. Financial problems associated with medical identity theft can be a major problem for a
provider. Sorting the problems out can require a lot of time, effort, and money. An attorney may be required to
assist in correcting the financial problems incurred.
Other potential medical identity theft problems with difficult consequences for a provider can include the
impact on a provider’s practice and reputation. A provider’s utilization may suffer if patients or other providers
are aware of an investigation. Quality reporting data can be skewed if false data are added to a provider’s
legitimate data. Being the provider of record for billed services the provider never furnished can create the
financial problems already mentioned, as well as calls, questions, and complaints from other providers and
patients reviewing bills with services charged in the provider’s name. Most importantly, all of these problems
may negatively affect a provider’s reputation.

Allowing the Misuse of Medical Identifiers Poses a Significant Risk
The consequences of medical identity theft for providers can be severe even when they have done nothing wrong.
Most providers are honest and do the right thing. In some cases, providers voluntarily permit or promote the
misuse of their identities for a variety of reasons, which places them at significant risk for subsequent theft.
Purposeful misuse of identifiers can also lead to consequences, such as civil monetary penalties,9 criminal fines
and restitution,10 prison time,11 and exclusion from Medicare and Medicaid.12 Common examples of ways
providers allow the misuse of their medical identifiers include signing referrals for patients they do not know,
signing Certificates of Medical Necessity (CMNs) for patients they know but who do not need the service or
supplies, signing CMNs even though their own documentation disputes medical need, signing CMNs for more
than what patients actually need, and even signing blank referral forms.13 Patients, other providers, or fraudsters
may ask a provider to accommodate these types of requests. It is important that all providers understand they “can
be held liable for these actions even without evidence of other fraud.”14
As one example shows, on January 12, 2012, a physician was sentenced to prison for committing healthcare
fraud. This physician accepted co-ownership of a healthcare clinic opened by a fraudster recruiting doctors. The
physician never treated any of the patients but allowed the submission of claims in his name. He received patient
files transported to his office, at a separate location, where he signed off on the services.15

4
Mitigating Risks
You are responsible for your medical identifiers to the extent you can protect them and mitigate your vulnerability
to theft. Four strategies providers can use to protect themselves and their practices include actively managing
enrollment information with payers, monitoring billing and compliance processes, controlling unique medical
identifiers, and engaging patients in a conversation about medical identity theft.
ACTIVELY MANAGE ENROLLMENT INFORMATION WITH PAYERS
You can actively manage enrollment information with payers by updating them about material enrollment changes
especially when opening, closing, or moving practice locations or when separating from an organization. You
should always keep your reimbursement banking information current. By keeping information current, payers
can alert providers to problems, such as additional billings from old locations or new locations opened without
the provider’s knowledge.
MONITOR BILLING AND COMPLIANCE PROCESSES
You can strengthen compliance activities by implementing sound policies and procedures to minimize your risk
and improve overall program integrity. The U.S. Department of Health & Human Services, Office of Inspector
General (HHS-OIG) has developed guidelines providers can use to improve business practices.16 While not
required of all providers, the guidelines are comprehensive and helpful. Visit https://oig.hhs.gov/compliance/
compliance-guidance/index.asp on the HHS-OIG website to review compliance guidelines.
Adopting sound billing practices is an extremely important strategy and cannot be overemphasized. You should
be aware of billings in your name, paying close attention to the organization(s) to which you have reassigned
billing privileges. Actively review organizational remittance notices, and compare them with medical record
documentation. Monitor mid-level provider activities and charting to ensure that documentation supports billed
services. Read all documents before you sign them and keep copies. Document any conversation(s) you have with
someone else about billing issues, and report suspected fraud.
Remember, whether staff or a third-party biller completes the claims processing services, the provider of record
is responsible for the billings submitted. A provider’s signature certifies the truth and accuracy of signed and
submitted claims.17 Ensure all services billed are accurate and supported in the medical record.
CONTROL UNIQUE MEDICAL IDENTIFIED
Prospective Employers: Avoid giving your identifiers to potential employers or organizations before taking the
time to learn about them. Check out prospective employers before applying to work with them or handing over
medical identifying information.

Understanding and Preventing Provider Medical Identity Theft

5
Train Staff: Train your staff on the appropriate use and distribution of your medical identifiers, including when
not to distribute them. For example, make sure to train staff to question unknown providers who contact your
office. If office policy allows information sharing over the phone, require staff to take a caller’s telephone number
and call them back with the information so staff can authenticate the call. Another precaution staff can take is to
compare the location of a referring provider in relation to the office and the patient’s residence. If the distance
seems unreasonable, additional calls may be required.18 Carefully consider which staff will have access to your
medical identifiers.
Control Prescription Pads: Medicaid regulations began requiring tamper-resistant prescription pads April 1,
2008. All written prescriptions must include security features like a watermark or thermal ink, which shows any
attempt to alter a prescription, and industry-recognized design features that prevent counterfeit prescriptions.19
Additional precautions are reasonable. For example, do not inadvertently leave prescription pads unattended in
examination rooms or other public areas. Keep prescription pads locked up when not in use, and do not leave them
visible in your car. You may want to take a daily count of prescription pads. Also, clearly and completely fill out
prescriptions and other documents to prevent tampering.
ENGAGE PATIENTS
As a provider, you are in an excellent position to raise awareness with patients about medical identity theft and
the problems and dangers associated with it. While most patients automatically receive medical bills and an
explanation of benefits (EOBs) following an appointment, Medicaid patients normally do not. Encourage patients
to request and review their medical bills. By reviewing bills, they may be able to spot medical identity theft by
identifying services they did not receive. Encourage patients to review their EOBs, including their Medicare
Summary Notices and Medicaid bills.

Remediation for Victims
Assistance is available for victims of medical identity theft. The CMS Center for Program Integrity (CPI) is
working hard to assist victims through a validation/remediation initiative. The goal of the process is to respond
to legitimate provider needs, to establish a consistent process for determining and validating provider victims of
identity theft, and to help absolve the financial problems related to the theft, such as Medicare overpayments or
tax obligations. For a description of the remediation process and who to contact if you experience problems, visit
https://www.cms.gov/Medicare/Provider-Enrollment-and-Certification/MedicareProviderSupEnroll/downloads//
ProviderVictimPOCs.pdf on the CMS website. In addition to this remediation process, through additional tools,
such as predictive modeling and rigorous screening for enrollees, and through preventive policies, such as
suspending payments to suspected criminals,20 CMS continues working to eliminate medical identity theft.

6
Report It
Any provider concerned that he or she may be the victim of medical identity theft should contact:
Local law enforcement service in your area
State Medicaid agency—visit https://www.cms.gov/FraudAbuseforConsumers/Downloads/smafraudcontacts.pdf
on the CMS website. Click on the state where you practice for the appropriate contact information, and then notify
the agency.
Federal Trade Commission (FTC)—contact the FTC’s Identity Theft Hotline to Report misuse of your
personal information:
Phone: 1-877-438-4338 (1-877-ID-THEFT)
TTY: 1-866-653-4261
Website: http://www.ftc.gov/bcp/edu/microsites/idtheft/
U.S. Department of Health & Human Services, Office of Inspector General Hotline and report suspected fraud:
Phone: 1-800-447-8477 (1-800-HHS-TIPS)
TTY: 1-800-377-4950
Fax: 1-800-223-8164
E-mail: HHSTips@oig.hhs.gov
Website: https://oig.hhs.gov/fraud/report-fraud/index.asp
Health and Human Services regional office—visit http://www.hhs.gov/about/regions/ on the U.S. Department of
Health & Human Services website, and click on your region for contact information.

Understanding and Preventing Provider Medical Identity Theft

7
References
1 New York Office of the Attorney General. (February 16, 2012). “As Rx Abuse Rises, A.G. Schneiderman
Secures Prison Time for a Woman Who Forged More Than 250 Painkiller Prescriptions.” Retrieved February
29, 2012, from http://www.ag.ny.gov/press-release/rx-abuse-rises-ag-schneiderman-announces-prison-sentencewoman-who-forged-more-250
2 Agrawal S. & Budetti P. (February 1, 2012). “Physician Medical Identity Theft.” “JAMA” (The Journal of the
American Medical Association), 307(5), 459–460.
3 Centers for Medicare & Medicaid Services. Retrieved February 13, 2012, from http://www.cms.gov/
4 Centers for Medicare & Medicaid Services. The Healthcare Integrated General Ledger Accounting System.
Retrieved February 13, 2012, from http://www.cms.gov/higlas/
5 Federal Trade Commission. (February 2010). Consumer Sentinel Network Data Book. Retrieved April 5, 2012,
from http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2009.pdf
6 Agrawal S. & Budetti P. (February 1, 2012). “Physician Medical Identity Theft.” “JAMA” (The Journal of the
American Medical Association), 307(5), 459–460.
7 U.S. Attorney’s Office, Southern District of Texas. (February 9, 2012). “Former DME Company Owner Lands
in Federal Prison.” Retrieved April 4, 2012, from http://www.justice.gov/usao/txs/1News/Releases/2012%20
February/120209%20Essien.html
8 U.S. Attorney’s Office, Middle District of Florida. (January 5, 2012). “Sarasota County Woman Sentenced For
Health Care Fraud.” Retrieved March 3, 2012, from http://www.justice.gov/usao/flm/press/2012/jan/20120105_
Matchin.html
9 Social Security Act, § 1128A(a)(1),(3). Civil Monetary Penalties. Retrieved March 3, 2012, from http://www.
ssa.gov/OP_Home/ssact/title11/1128A.htm
10 United States Code, 31 U.S.C. § 3729(a) and (b). Retrieved March 2, 2012, from http://uscode.house.gov/
download/pls/31C37.txt
11 United States Code, 18 U.S.C. § 287. False, Fictitious or Fraudulent Claims. Retrieved March 2, 2012, from
http://www.law.cornell.edu/uscode/text/18/287
12 Social Security Act, § 1128(b)(6)(B). Exclusion of Certain Individuals and Entities from Participation in
Medicare and State Health Care Programs. Retrieved March 2, 2012, from http://www.socialsecurity.gov/OP_
Home/ssact/title11/1128.htm
13 Doolittle, T. (2011, Public Comments). CMS Initiative to Help Victims of Provider Medical Identity Theft.
Retrieved March 3, 2012.
14 Agrawal, S. (February 13, 2012). Preventing and Detecting Physician Medical Identity Theft. Centers for
Medicare & Medicaid Services, Center for Program Integrity. Retrieved March 20, 2012.
15 U.S. Department of Justice. (January 12, 2012). “Physician Sentenced To Eight Years In Federal Prison For
Role In Massive Medicare Fraud Scam.” Retrieved March 8, 2012, from http://www.justice.gov/usao/cae/news/
docs/2012/01-12-12PopovSentencing.html
16 U.S. Department of Health & Human Services. Office of Inspector General. Compliance Guidance. Retrieved
March 9, 2012, from https://oig.hhs.gov/compliance/compliance-guidance/index.asp

8
17 U.S. Department of Health & Human Services, Office of Inspector General. (October 5, 2000). Notices. 65
Fed. Reg. 59434–59435. Retrieved March 30, 2012, from http://www.gpo.gov/fdsys/pkg/FR-2000-10-05/pdf/0025500.pdf
18 U.S. Department of Health & Human Services, Office of Inspector General. (March 13, 2012). Office of
Investigations Representative.
19 Medicare Learning Network. (April 2012). Medicaid Program Integrity: Understanding Provider Medical
Identity Theft. (p.6). Retrieved December 17, 2012, from http://www.cms.gov/Outreach-and-Education/MedicareLearning-Network-MLN/MLNProducts/Downloads/Med-ID-Theft-Booklet-ICN908264.pdf
20 U.S. Department of Health & Human Services. (February 2, 2011). Rules and Regulations. 76 Fed. Reg. 5862.
Retrieved February 6, 2012, from http://www.gpo.gov/fdsys/pkg/FR-2011-02-02/pdf/2011-1686.pdf

Disclaimer
This booklet was current at the time it was published or uploaded onto the web. Medicaid and Medicare policies
change frequently so links to the source documents have been provided within the document for your reference.
This booklet was prepared as a service to the public and is not intended to grant rights or impose obligations. This
booklet may contain references or links to statutes, regulations, or other policy materials. The information provided
is only intended to be a general summary. Use of this material is voluntary. Inclusion of a link does not constitute
CMS endorsement of the material. We encourage readers to review the specific statutes, regulations, and other
interpretive materials for a full and accurate statement of their contents.
April 2012

Understanding and Preventing Provider Medical Identity Theft

9
April 2012

Contenu connexe

Tendances

Medical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious OffshootsMedical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious Offshootsmosmedicalreview
 
Medical Billing Fraud
Medical Billing FraudMedical Billing Fraud
Medical Billing Fraudmagicalmilon
 
Chapter 3 health fraud
Chapter 3 health fraudChapter 3 health fraud
Chapter 3 health frauddlhammond
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePHXONLINE
 
12 medicaid fraud & abuse
12 medicaid fraud & abuse12 medicaid fraud & abuse
12 medicaid fraud & abuseJasonPickerill1
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity TheftFairfax County
 
red flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Webred flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_WebDulcey Whyte
 
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...RightPatient®
 
Medical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajMedical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajSidhantloveraj
 
Preventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health CarePreventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health CareDr. Zabian Crosby, D.H.Ed.
 
Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)William Copeland
 
medical billing training notes
medical billing training notesmedical billing training notes
medical billing training noteswaqas gogan
 
Universal Patient Identity: eliminating duplicate records, medical identity t...
Universal Patient Identity: eliminating duplicate records, medical identity t...Universal Patient Identity: eliminating duplicate records, medical identity t...
Universal Patient Identity: eliminating duplicate records, medical identity t...3GDR
 
Health insurance fraud presentation
Health insurance fraud presentationHealth insurance fraud presentation
Health insurance fraud presentationBayzat
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialitypraisehim1
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentialitypraisehim1
 
Legal & Regulatory Powerpoint
Legal & Regulatory PowerpointLegal & Regulatory Powerpoint
Legal & Regulatory PowerpointKendall Brune
 

Tendances (18)

Medical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious OffshootsMedical Identity Theft and Its Serious Offshoots
Medical Identity Theft and Its Serious Offshoots
 
Medical Billing Fraud
Medical Billing FraudMedical Billing Fraud
Medical Billing Fraud
 
Chapter 3 health fraud
Chapter 3 health fraudChapter 3 health fraud
Chapter 3 health fraud
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training Module
 
12 medicaid fraud & abuse
12 medicaid fraud & abuse12 medicaid fraud & abuse
12 medicaid fraud & abuse
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity Theft
 
red flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Webred flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Web
 
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
 
Medical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajMedical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant Raj
 
Preventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health CarePreventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health Care
 
Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)
 
medical billing training notes
medical billing training notesmedical billing training notes
medical billing training notes
 
SMMC Long-term Care Provider Webinar: Medicaid Provider Enrollment
SMMC Long-term Care Provider Webinar:  Medicaid Provider EnrollmentSMMC Long-term Care Provider Webinar:  Medicaid Provider Enrollment
SMMC Long-term Care Provider Webinar: Medicaid Provider Enrollment
 
Universal Patient Identity: eliminating duplicate records, medical identity t...
Universal Patient Identity: eliminating duplicate records, medical identity t...Universal Patient Identity: eliminating duplicate records, medical identity t...
Universal Patient Identity: eliminating duplicate records, medical identity t...
 
Health insurance fraud presentation
Health insurance fraud presentationHealth insurance fraud presentation
Health insurance fraud presentation
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Patient confidentiality
Patient confidentialityPatient confidentiality
Patient confidentiality
 
Legal & Regulatory Powerpoint
Legal & Regulatory PowerpointLegal & Regulatory Powerpoint
Legal & Regulatory Powerpoint
 

Similaire à Understanding and Preventing Provider Medical Identity Theft

Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)Modupe Sarratt
 
Urgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR ServicesUrgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR Serviceseverestar
 
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare FraudHealth 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare FraudHealth 2Conf
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
Healthcare fraud investigation in miami
Healthcare fraud investigation in miamiHealthcare fraud investigation in miami
Healthcare fraud investigation in miamiJackWilson940113
 
Healthcare fraud investigation in miami
Healthcare fraud investigation in miamiHealthcare fraud investigation in miami
Healthcare fraud investigation in miamiJackWilson940113
 
Medicare, Medicaid, and the Health Insurance Portability and Accou.docx
Medicare, Medicaid, and the Health Insurance Portability and Accou.docxMedicare, Medicaid, and the Health Insurance Portability and Accou.docx
Medicare, Medicaid, and the Health Insurance Portability and Accou.docxbuffydtesurina
 
2hourhealthcarefraud
2hourhealthcarefraud2hourhealthcarefraud
2hourhealthcarefraudcccpfc
 
Understanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdfUnderstanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdfCosentus
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...Health 2Conf
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...
The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...
The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...Health 2Conf
 
54843060_Pages from Module 2-Medical Billing_1.pdf
54843060_Pages from Module 2-Medical Billing_1.pdf54843060_Pages from Module 2-Medical Billing_1.pdf
54843060_Pages from Module 2-Medical Billing_1.pdfRajv360
 
Importance of insurance eligibility verification during COVID-19
Importance of insurance eligibility verification during COVID-19Importance of insurance eligibility verification during COVID-19
Importance of insurance eligibility verification during COVID-19Jessica Parker
 
Reviewing The Legit Identity Theft In The Healthcare Sector
Reviewing The Legit Identity Theft In The Healthcare Sector Reviewing The Legit Identity Theft In The Healthcare Sector
Reviewing The Legit Identity Theft In The Healthcare Sector Health 2Conf
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staffsawanda
 
How To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
How To Detect And Prevent Healthcare Fraud? | Health 2.0 ConferenceHow To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
How To Detect And Prevent Healthcare Fraud? | Health 2.0 ConferenceHealth 2Conf
 

Similaire à Understanding and Preventing Provider Medical Identity Theft (20)

Jamila Fraud & Abuse
Jamila Fraud & AbuseJamila Fraud & Abuse
Jamila Fraud & Abuse
 
Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)
 
Urgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR ServicesUrgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR Services
 
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare FraudHealth 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Healthcare fraud investigation in miami
Healthcare fraud investigation in miamiHealthcare fraud investigation in miami
Healthcare fraud investigation in miami
 
Healthcare fraud investigation in miami
Healthcare fraud investigation in miamiHealthcare fraud investigation in miami
Healthcare fraud investigation in miami
 
Medicare, Medicaid, and the Health Insurance Portability and Accou.docx
Medicare, Medicaid, and the Health Insurance Portability and Accou.docxMedicare, Medicaid, and the Health Insurance Portability and Accou.docx
Medicare, Medicaid, and the Health Insurance Portability and Accou.docx
 
2hourhealthcarefraud
2hourhealthcarefraud2hourhealthcarefraud
2hourhealthcarefraud
 
Understanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdfUnderstanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdf
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...
The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...
The Devastating Impact Of Healthcare Fraud On Patients: Understanding the Ris...
 
Mhpr fraud waste and abuse training for providers
Mhpr fraud waste and abuse training for providersMhpr fraud waste and abuse training for providers
Mhpr fraud waste and abuse training for providers
 
54843060_Pages from Module 2-Medical Billing_1.pdf
54843060_Pages from Module 2-Medical Billing_1.pdf54843060_Pages from Module 2-Medical Billing_1.pdf
54843060_Pages from Module 2-Medical Billing_1.pdf
 
Importance of insurance eligibility verification during COVID-19
Importance of insurance eligibility verification during COVID-19Importance of insurance eligibility verification during COVID-19
Importance of insurance eligibility verification during COVID-19
 
Reviewing The Legit Identity Theft In The Healthcare Sector
Reviewing The Legit Identity Theft In The Healthcare Sector Reviewing The Legit Identity Theft In The Healthcare Sector
Reviewing The Legit Identity Theft In The Healthcare Sector
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staff
 
How To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
How To Detect And Prevent Healthcare Fraud? | Health 2.0 ConferenceHow To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
How To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
 

Plus de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Plus de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Dernier

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 

Dernier (20)

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 

Understanding and Preventing Provider Medical Identity Theft

  • 1. Understanding and Preventing Provider Medical Identity Theft
  • 2. Content Summary Providers and beneficiaries of Medicare and Medicaid are at risk for medical identity theft. The Centers for Medicare & Medicaid Services (CMS) is working to raise awareness among providers and help them protect their medical identities. This booklet outlines the scope and definition of medical identity theft, common schemes using stolen identities, consequences for victims, mitigation strategies, and appropriate actions for potential victims of medical identity theft. The booklet provides examples of adjudicated criminal cases involving stolen provider medical identities and pragmatic approaches they can use to protect themselves against medical identity theft. Proactive approaches include managing enrollment information with payers, monitoring billing and compliance processes, controlling unique medical identifiers, and engaging patients so they are aware of the risks of medical identity theft. No one wants to be a victim of medical identity theft. Providers can use several strategies to protect against it. 2
  • 3. Medical Identity Theft Scheme On February 16, 2012, the ringleader of an illegal prescription drug operation in New York received consecutive prison sentences totaling between 4 and 8 years. In addition to prison, she is required to pay the New York State Medicaid program more than $200,000 for forging more than 250 prescriptions for narcotics. Between 2009 and 2011, she wrote prescriptions using stolen prescription paper obtained from doctors and hospitals in the New York City area. She wrote some of the prescriptions by hand and created others digitally. At the time of her arrest, she had enough paper to write an additional 1,500 prescriptions. Also found was a special printer used to process thermal prescriptions. According to law enforcement, “The scope and reach of [her] profit-making operation was significant. As the ringleader, she worked with multiple co-conspirators to create prescriptions in the names of real Medicaid recipients. Working with another group of co-conspirators, she then arranged for the forged prescriptions [using physician medical identifiers] to be filled at pharmacies throughout the state.”1 The theft and misuse of physician and beneficiary medical identifiers was central to this scheme and cost the healthcare system more than $200,000. The Scope of Medical Identity Medical identity theft is a growing and costly issue. Physicians, other providers, and their patients are vulnerable to it. It is defined as “the appropriation or misuse of a patient’s or [provider’s] unique medical identifying information to obtain or bill public or private payers for fraudulent medical goods or services.”2 This type of theft is one of several forms of healthcare fraud. The Federal government, in conjunction with State governments, provides healthcare coverage for 100 million people through Medicare, Medicaid, and the Children’s Health Insurance Program,3 which is equivalent to about one out of every four individuals in this country, and amounts to expenditures of more than $635 billion in taxpayer dollars per year.4 The very size of these healthcare programs makes them targets for fraud. Both the Federal Trade Commission (FTC) and the Centers for Medicare & Medicaid Services (CMS) track cases of provider and patient medical identity theft. The latest FTC data show that more than 3,600 physician and patient cases of medical identity theft were reported in 2009, with more than 12,000 cases reported between 2007 and 2009.5 Common Medical Identity Theft Schemes All providers are at risk for medical identity theft. Criminals use two major approaches to bill fraudulent claims with stolen medical identities. In the first approach, provider medical identifiers are used to make it appear as if providers ordered or referred patients for additional health services, such as durable medical equipment (DME), diagnostic testing, or home health services.6 For example, on February 9, 2012, the co-owner of a DME company in Texas was sentenced to 99 months in Federal prison for routinely billing Medicaid for medicallyunnecessary supplies never delivered to beneficiaries. The owner used stolen beneficiary and physician medical identifiers to bill claims totaling more than $2 million.7 In the second approach, provider medical identifiers are used to make it appear that a physician provided and billed services directly. On January 5, 2012, a woman in Florida was sentenced to prison for using a New York physician’s medical identifiers from April 2004 through March 2007 to bill services never rendered. She billed the services to a Medicare Part B carrier in New Jersey. The physician did not know the perpetrator, never saw any of the patients, and did not give permission to use his identity.8 Understanding and Preventing Provider Medical Identity Theft 3
  • 4. Consequences of Medical Identity Theft It can take months, sometimes years before medical identity theft is recognized. A provider’s first awareness of a stolen medical identity may come in the form of a notice of overpayment from an insurance program demanding immediate repayment or as a notification from the Internal Revenue Service (IRS). For example, if the IRS receives notification that a provider of record has earned income for services rendered when those services were never reported on required tax documents, that provider may be the recipient of tax forms for income never received with a demand for payment. Responding to overpayment demand letters, responding to IRS notification letters, and correcting credit issues that can arise from medical identity theft are among the many potential consequences a provider may face. Financial problems associated with medical identity theft can be a major problem for a provider. Sorting the problems out can require a lot of time, effort, and money. An attorney may be required to assist in correcting the financial problems incurred. Other potential medical identity theft problems with difficult consequences for a provider can include the impact on a provider’s practice and reputation. A provider’s utilization may suffer if patients or other providers are aware of an investigation. Quality reporting data can be skewed if false data are added to a provider’s legitimate data. Being the provider of record for billed services the provider never furnished can create the financial problems already mentioned, as well as calls, questions, and complaints from other providers and patients reviewing bills with services charged in the provider’s name. Most importantly, all of these problems may negatively affect a provider’s reputation. Allowing the Misuse of Medical Identifiers Poses a Significant Risk The consequences of medical identity theft for providers can be severe even when they have done nothing wrong. Most providers are honest and do the right thing. In some cases, providers voluntarily permit or promote the misuse of their identities for a variety of reasons, which places them at significant risk for subsequent theft. Purposeful misuse of identifiers can also lead to consequences, such as civil monetary penalties,9 criminal fines and restitution,10 prison time,11 and exclusion from Medicare and Medicaid.12 Common examples of ways providers allow the misuse of their medical identifiers include signing referrals for patients they do not know, signing Certificates of Medical Necessity (CMNs) for patients they know but who do not need the service or supplies, signing CMNs even though their own documentation disputes medical need, signing CMNs for more than what patients actually need, and even signing blank referral forms.13 Patients, other providers, or fraudsters may ask a provider to accommodate these types of requests. It is important that all providers understand they “can be held liable for these actions even without evidence of other fraud.”14 As one example shows, on January 12, 2012, a physician was sentenced to prison for committing healthcare fraud. This physician accepted co-ownership of a healthcare clinic opened by a fraudster recruiting doctors. The physician never treated any of the patients but allowed the submission of claims in his name. He received patient files transported to his office, at a separate location, where he signed off on the services.15 4
  • 5. Mitigating Risks You are responsible for your medical identifiers to the extent you can protect them and mitigate your vulnerability to theft. Four strategies providers can use to protect themselves and their practices include actively managing enrollment information with payers, monitoring billing and compliance processes, controlling unique medical identifiers, and engaging patients in a conversation about medical identity theft. ACTIVELY MANAGE ENROLLMENT INFORMATION WITH PAYERS You can actively manage enrollment information with payers by updating them about material enrollment changes especially when opening, closing, or moving practice locations or when separating from an organization. You should always keep your reimbursement banking information current. By keeping information current, payers can alert providers to problems, such as additional billings from old locations or new locations opened without the provider’s knowledge. MONITOR BILLING AND COMPLIANCE PROCESSES You can strengthen compliance activities by implementing sound policies and procedures to minimize your risk and improve overall program integrity. The U.S. Department of Health & Human Services, Office of Inspector General (HHS-OIG) has developed guidelines providers can use to improve business practices.16 While not required of all providers, the guidelines are comprehensive and helpful. Visit https://oig.hhs.gov/compliance/ compliance-guidance/index.asp on the HHS-OIG website to review compliance guidelines. Adopting sound billing practices is an extremely important strategy and cannot be overemphasized. You should be aware of billings in your name, paying close attention to the organization(s) to which you have reassigned billing privileges. Actively review organizational remittance notices, and compare them with medical record documentation. Monitor mid-level provider activities and charting to ensure that documentation supports billed services. Read all documents before you sign them and keep copies. Document any conversation(s) you have with someone else about billing issues, and report suspected fraud. Remember, whether staff or a third-party biller completes the claims processing services, the provider of record is responsible for the billings submitted. A provider’s signature certifies the truth and accuracy of signed and submitted claims.17 Ensure all services billed are accurate and supported in the medical record. CONTROL UNIQUE MEDICAL IDENTIFIED Prospective Employers: Avoid giving your identifiers to potential employers or organizations before taking the time to learn about them. Check out prospective employers before applying to work with them or handing over medical identifying information. Understanding and Preventing Provider Medical Identity Theft 5
  • 6. Train Staff: Train your staff on the appropriate use and distribution of your medical identifiers, including when not to distribute them. For example, make sure to train staff to question unknown providers who contact your office. If office policy allows information sharing over the phone, require staff to take a caller’s telephone number and call them back with the information so staff can authenticate the call. Another precaution staff can take is to compare the location of a referring provider in relation to the office and the patient’s residence. If the distance seems unreasonable, additional calls may be required.18 Carefully consider which staff will have access to your medical identifiers. Control Prescription Pads: Medicaid regulations began requiring tamper-resistant prescription pads April 1, 2008. All written prescriptions must include security features like a watermark or thermal ink, which shows any attempt to alter a prescription, and industry-recognized design features that prevent counterfeit prescriptions.19 Additional precautions are reasonable. For example, do not inadvertently leave prescription pads unattended in examination rooms or other public areas. Keep prescription pads locked up when not in use, and do not leave them visible in your car. You may want to take a daily count of prescription pads. Also, clearly and completely fill out prescriptions and other documents to prevent tampering. ENGAGE PATIENTS As a provider, you are in an excellent position to raise awareness with patients about medical identity theft and the problems and dangers associated with it. While most patients automatically receive medical bills and an explanation of benefits (EOBs) following an appointment, Medicaid patients normally do not. Encourage patients to request and review their medical bills. By reviewing bills, they may be able to spot medical identity theft by identifying services they did not receive. Encourage patients to review their EOBs, including their Medicare Summary Notices and Medicaid bills. Remediation for Victims Assistance is available for victims of medical identity theft. The CMS Center for Program Integrity (CPI) is working hard to assist victims through a validation/remediation initiative. The goal of the process is to respond to legitimate provider needs, to establish a consistent process for determining and validating provider victims of identity theft, and to help absolve the financial problems related to the theft, such as Medicare overpayments or tax obligations. For a description of the remediation process and who to contact if you experience problems, visit https://www.cms.gov/Medicare/Provider-Enrollment-and-Certification/MedicareProviderSupEnroll/downloads// ProviderVictimPOCs.pdf on the CMS website. In addition to this remediation process, through additional tools, such as predictive modeling and rigorous screening for enrollees, and through preventive policies, such as suspending payments to suspected criminals,20 CMS continues working to eliminate medical identity theft. 6
  • 7. Report It Any provider concerned that he or she may be the victim of medical identity theft should contact: Local law enforcement service in your area State Medicaid agency—visit https://www.cms.gov/FraudAbuseforConsumers/Downloads/smafraudcontacts.pdf on the CMS website. Click on the state where you practice for the appropriate contact information, and then notify the agency. Federal Trade Commission (FTC)—contact the FTC’s Identity Theft Hotline to Report misuse of your personal information: Phone: 1-877-438-4338 (1-877-ID-THEFT) TTY: 1-866-653-4261 Website: http://www.ftc.gov/bcp/edu/microsites/idtheft/ U.S. Department of Health & Human Services, Office of Inspector General Hotline and report suspected fraud: Phone: 1-800-447-8477 (1-800-HHS-TIPS) TTY: 1-800-377-4950 Fax: 1-800-223-8164 E-mail: HHSTips@oig.hhs.gov Website: https://oig.hhs.gov/fraud/report-fraud/index.asp Health and Human Services regional office—visit http://www.hhs.gov/about/regions/ on the U.S. Department of Health & Human Services website, and click on your region for contact information. Understanding and Preventing Provider Medical Identity Theft 7
  • 8. References 1 New York Office of the Attorney General. (February 16, 2012). “As Rx Abuse Rises, A.G. Schneiderman Secures Prison Time for a Woman Who Forged More Than 250 Painkiller Prescriptions.” Retrieved February 29, 2012, from http://www.ag.ny.gov/press-release/rx-abuse-rises-ag-schneiderman-announces-prison-sentencewoman-who-forged-more-250 2 Agrawal S. & Budetti P. (February 1, 2012). “Physician Medical Identity Theft.” “JAMA” (The Journal of the American Medical Association), 307(5), 459–460. 3 Centers for Medicare & Medicaid Services. Retrieved February 13, 2012, from http://www.cms.gov/ 4 Centers for Medicare & Medicaid Services. The Healthcare Integrated General Ledger Accounting System. Retrieved February 13, 2012, from http://www.cms.gov/higlas/ 5 Federal Trade Commission. (February 2010). Consumer Sentinel Network Data Book. Retrieved April 5, 2012, from http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2009.pdf 6 Agrawal S. & Budetti P. (February 1, 2012). “Physician Medical Identity Theft.” “JAMA” (The Journal of the American Medical Association), 307(5), 459–460. 7 U.S. Attorney’s Office, Southern District of Texas. (February 9, 2012). “Former DME Company Owner Lands in Federal Prison.” Retrieved April 4, 2012, from http://www.justice.gov/usao/txs/1News/Releases/2012%20 February/120209%20Essien.html 8 U.S. Attorney’s Office, Middle District of Florida. (January 5, 2012). “Sarasota County Woman Sentenced For Health Care Fraud.” Retrieved March 3, 2012, from http://www.justice.gov/usao/flm/press/2012/jan/20120105_ Matchin.html 9 Social Security Act, § 1128A(a)(1),(3). Civil Monetary Penalties. Retrieved March 3, 2012, from http://www. ssa.gov/OP_Home/ssact/title11/1128A.htm 10 United States Code, 31 U.S.C. § 3729(a) and (b). Retrieved March 2, 2012, from http://uscode.house.gov/ download/pls/31C37.txt 11 United States Code, 18 U.S.C. § 287. False, Fictitious or Fraudulent Claims. Retrieved March 2, 2012, from http://www.law.cornell.edu/uscode/text/18/287 12 Social Security Act, § 1128(b)(6)(B). Exclusion of Certain Individuals and Entities from Participation in Medicare and State Health Care Programs. Retrieved March 2, 2012, from http://www.socialsecurity.gov/OP_ Home/ssact/title11/1128.htm 13 Doolittle, T. (2011, Public Comments). CMS Initiative to Help Victims of Provider Medical Identity Theft. Retrieved March 3, 2012. 14 Agrawal, S. (February 13, 2012). Preventing and Detecting Physician Medical Identity Theft. Centers for Medicare & Medicaid Services, Center for Program Integrity. Retrieved March 20, 2012. 15 U.S. Department of Justice. (January 12, 2012). “Physician Sentenced To Eight Years In Federal Prison For Role In Massive Medicare Fraud Scam.” Retrieved March 8, 2012, from http://www.justice.gov/usao/cae/news/ docs/2012/01-12-12PopovSentencing.html 16 U.S. Department of Health & Human Services. Office of Inspector General. Compliance Guidance. Retrieved March 9, 2012, from https://oig.hhs.gov/compliance/compliance-guidance/index.asp 8
  • 9. 17 U.S. Department of Health & Human Services, Office of Inspector General. (October 5, 2000). Notices. 65 Fed. Reg. 59434–59435. Retrieved March 30, 2012, from http://www.gpo.gov/fdsys/pkg/FR-2000-10-05/pdf/0025500.pdf 18 U.S. Department of Health & Human Services, Office of Inspector General. (March 13, 2012). Office of Investigations Representative. 19 Medicare Learning Network. (April 2012). Medicaid Program Integrity: Understanding Provider Medical Identity Theft. (p.6). Retrieved December 17, 2012, from http://www.cms.gov/Outreach-and-Education/MedicareLearning-Network-MLN/MLNProducts/Downloads/Med-ID-Theft-Booklet-ICN908264.pdf 20 U.S. Department of Health & Human Services. (February 2, 2011). Rules and Regulations. 76 Fed. Reg. 5862. Retrieved February 6, 2012, from http://www.gpo.gov/fdsys/pkg/FR-2011-02-02/pdf/2011-1686.pdf Disclaimer This booklet was current at the time it was published or uploaded onto the web. Medicaid and Medicare policies change frequently so links to the source documents have been provided within the document for your reference. This booklet was prepared as a service to the public and is not intended to grant rights or impose obligations. This booklet may contain references or links to statutes, regulations, or other policy materials. The information provided is only intended to be a general summary. Use of this material is voluntary. Inclusion of a link does not constitute CMS endorsement of the material. We encourage readers to review the specific statutes, regulations, and other interpretive materials for a full and accurate statement of their contents. April 2012 Understanding and Preventing Provider Medical Identity Theft 9