As medical identity theft continues to rise, so does its impact on the healthcare industry and patients. Prevention is possible with the right health IT solutions.

In 2014, nearly 9 million patient health records were breached in 164 reported incidents. By March 2015, that number had increased tenfold. In fact, it is estimated that one in three health records were compromised during 2016 alone.1 Records can be physically stolen from medical facilities, so it is important to prevent data acquisition in this manner. But with the prevalence of health IT systems in place, cybersecurity —not just on the backend, but with a complete security ring around data—is absolutely critical to eliminate the prevalence of medical identity theft. Health systems must implement a 360-degree risk mitigation strategy to cover every potential breach.

The impact of medical identity theft

Protected health information (PHI) is highly valuable on the black market because it can be used to obtain pharmaceuticals, commit insurance fraud or obtain medical care through channels such as Medicaid and Medicare. In fact, according to the FBI, stolen health information currently fetches $60-$70 on the black market, while a Social Security number goes for less than $1.1

The fiscal impact of medical identity theft is considerable, generating losses to the health industry of more than $30 billion each year. However, patients also sustain financial consequences of fraud, having to pay an average of $13,500 to resolve these issues.2

The current thinking in the industry today is that performing computer-generated data conciliation processes in the backend increases the risk of data corruption. However, the entire focus of medical identity theft is to emulate another person. While many organizations feel they don’t have a medical identity theft problem (the “it’s-not-me” belief), the astronomical costs tell otherwise.

But the costs are not just monetary. Medical identity theft can cause delays in treatment, misdiagnosis and inappropriate care. The health data of the imposter is merged with the identity of the real patient, creating serious inaccuracies in health data that can be life-threatening.

Coincidence or crime?

Patient misidentification may not necessarily involve criminal activity. Often medical identity issues arise due to the inadequacy of name and birthday as current identifiers. Even if the identity of a patient is verified, there is a significant chance that other patients in that system share the same name or birthday, and sometimes both.

Although released several years ago, the Harris Health System in Houston published a set of data that demonstrates just how many similar identifying factors some patients share. Among more than 3.4 million patients, two patients sharing the same first and last name occurred 249,213 times. In the same set of data, patients sharing the same first name, last name and birthday occurred almost 70,000 times. Five or more patients shared the same first and last name more than 76,000 times. Are these records unique individuals or duplicates? How many represent different people? Or is medical identity theft a factor?

Securing patient identity

There are numerous coinciding factors that providers use to identify patients. The verifiability and accuracy of these records is imperative for health organizations to keep track of individual patients and manage the overall patient population. To prevent medical identity theft and keep treatment and diagnosis as accurate as possible, health systems need a reliable method of deciphering patients with an uncompromising identity-proofing process.

Health organizations must invest in the appropriate health IT to ensure patients are not vulnerable to the costly risks of medical identity theft—and that technology must involve identity-proofing individuals across multiple healthcare settings, not just in siloes. Implementing a unique health safety identifier (UHSI) is a great first step in strengthening IT security, preserving data integrity and saving health organizations and their patients’ money. And taking these legacy challenges out of the health IT ecosystem will allow an acceleration toward a value-based care delivery model.

The success of value-based care demands innovative, reliable health IT solutions. A unique health safety identifier is a positive start to improving data quality at the point of care, as well as along the entire spectrum of care and within the growing virtual care arena. The goal for every care provider must be: one patient, one identity, one record.



Taking out a loan can be riskybusiness as it fraught with many stringent conditions that cannot be left toperfunctory or shallow reading off promotional materials. A lending company canprovide service that helps a prospective borrower understand the conditions ofthe loan and avoid being scammed. However, the best way to assure a stress-freeand risk-free path to acquiring a loan is through the assistance of anexperienced loan consultant, such as Crosby Corporation.

Here are some benefits derived fromhiring a loan consultant:

1. Avoid high interest rate loans

Companies like Crosby Corp. protectclients from acquiring or purchasing loans that have onerous rates butdisguised as friendly, affordable loans. It will require looking into all thehidden costs and other fees to determine the final cost of a loan. Aprofessional loan risk assessment is needed to help prospective borrowers toavoid getting into a disastrous financial commitment.

2. Minimize risks of possiblenon-compliance

The possibility of non-complianceto certain loan provisions can cause a company’s project to falter or evenflop, leading to loss of revenue and so much disruption to its overalloperations. Such requirements as additional collaterals to cover additionalloans due to increases in material or labor costs and other contingencyexpenses can put a great burden on a project’s capability to keep afloat. Loancounselors can aid borrowers in clearing the way toward minimizing such risksand avoid mortgage fraud.

3. Evaluate risk due to loanrescission

The possibilityof a loan being rescinded due to default on payments or diminishedcollateral value to cover the loan can be a real risk for any borrower. Hence,before entering into an agreement, a borrower needs to assess the chances of aloan rescission with the help of a professional loan counselor. Threshing outthe details of a client’s financial capability to take out a loan anddetermining all the actual and possible costs that will be incurred all goesinto assuring the borrower that the risk is eliminated.

4. Determine consumer disclosureaccuracy

Moreover, a prospective borrowerneeds the reassurance that a lender is transparent as far as loan requirementsare concerned. Any hidden costs, clauses and added provisions can stall aclient’s project at mid-stream. Broad experience and expertise pertaining tolender normal procedures as well as their “abnormal” practices can spell thedifference between a good loan and a bad loan.

5. Evaluate agency complianceguidelines

Compliance to agency stipulationsin relation to loans can deter many interested borrowers or even cause them toincrease the risk of failing to close a loan agreement. Crosby Corp. has thecapability to assist its clients avoid that risk through proper fulfillment ofthose requirements in a professional and prompt manner.

Minimizing or reducing these risksinvolved in acquiring a loan can provide better chances for a client to improvehis business.