Medical Identity Theft (OnDemand Webinar)

$149.00

SKU: 411108EAU

Description

Identity theft is an ongoing problem, and the medical field is no exception. Learn and understand how to prevent medical identify theft.A recent health care information hack exposed the nonpublic financial information of potentially 20 million Quest Diagnostic, LabCorp, and BioReference patients to fraudsters resulting in harm and damage to the brand reputations of the affected laboratories as well as vendors providing critical payment services on their behalf. As more and more convenient technologies are put into use to allow patients to view their medical records, schedule appointments, pay bills, and chat with others with similar diagnoses, how attuned are we to the potential risks of medical identity theft and what tools do we have to detect and prevent suspicious activity? In this topic, you will be able to identify and debunk myths about medical identity theft while learning about current trends and concerns of data security experts. From a compliance perspective, this will prepare you to finetune your organization’s own programs. You will be able to update your strategies for handling and documenting investigations as well as your options for offering credit monitoring resources or other remedies should you be faced with one or more instances of medical identity theft. Finally, in this material, you will review data and statistics about where medical identity theft is occurring to assure you are aware of how and whether your organization and its programs are vulnerable to it.

Date: 2024-01-11 Start Time: End Time:

Learning Objectives

Is Medical Identity Theft Still a Thing After All These Data Breach Notice Laws?
• The HIPAA/Hitech Data Breach Notification Structure and Proliferation of State Breach Notice Laws
• The Nitty Gritty on the Incidence and Types of Medical Identity Theft
• Costs and Risks Associated With Medical Identity Theft

What Are the Components of a Responsible Medical Identity Theft Prevention, Detection, Handling and Remediation Program
• Preventive Controls: Training and Awareness Programs, Hotlines, Workforce Clearance Strategies, and Solid Administrative Foundation for Your Data Protection Program
• Detective Controls: Electronic Monitoring and Other Forms of Monitoring, Hotlines, Suggestion Boxes, Complaint Boxes, and Audits and Inspections
• Reactive Controls: Conducting and Documenting Your Investigation, Framing up a Plan for Communicating With Law Enforcement and Affected Individuals, Giving Notices About the Incident

Debunking Myths About Credit Monitoring Services, Damages and Losses Associated With Medical Identity Theft, and Unicorns
• Recent Research Has Suggested That Credit Monitoring Services May Not Be as Effective as Originally Thought in Detecting or Preventing Medical Identity Theft
• Nature of the Losses and Damages Sustained Both by the Affected Patients and Your Healthcare Organization
• Coordinating With Vendors and Exchanging Patient Data With Third Parties • Pitfalls, Danger Zones and Unicorns

AHIMA ,CLE (Please check the Detailed Credit Information page for states that have already been approved) ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Leslie Bender, CIPP/US, CCCO, CCCA, IFCCE-Eversheds Sutherland (US)