Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Abuse by the NHS: Patient Consent and Confidentiality, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
Incidences of identity theft have been on the rise in recent years. Most recently, medical identity theft crimes have risen also-although this is something that most people never think about. When medical identity theft occurs, a thief uses the victims name and health insurance numbers to visit a doctor, purchase prescriptions, or get other forms of medical care. Electronic Patient Record is an electronic format that has practically replaced the traditional paper-based format. The use of modern technology has caused an increase in medical identity theft. A recent study found that nearly half of all medical identity thefts are the results of employee breaches (Healthcare, 2009). One incident occurred when a fired employee had hospital records on his personal laptop. The disgruntled worker leaked information about nearly 550 patient records from that medical facility (Healthcare, 2009). In some cases, medical personnel that have easy access to one’s medial information, uses the information to get prescription drugs to sell for profit or use to aid personal drug addictions. The theft culprits are, more often than not, doctors and medical personnel that understand how the insurance billing system operates. Medical identity theft is a fast growing problem that is wreaking havoc on individuals; therefore, one must know how to protect themselves, understand their legal rights, and be vigilant of personal information.
Protecting Yourself
Everyone must make themselves aware of how healthcare organizations and other entities use their personal information. One of the greatest challenges that the healthcare field faces today is developing a clear and enforceable privacy policy (Hung, 2005). When this is properly implemented, healthcare benefits are ensured. Communication between healthcare providers has become difficulty due to vocabulary and data exchange standards. Some countries are using safeguards to protect EPRs that monitor electronic records. Most in the healthcare field agree that EPR has made data exchange faster by speeding up diagnosis and reducing the cost of transferring and assessing medical records, but the main concern is client privacy and the risk of breaches that may allow sensitive information being trusted in the wrong hands. There are several ways the health care providers can ensure that clients’ information is protected. First, pre-employment background screenings is imperative. Any person with questionable criminal history should be eliminated from the possible candidates. Next, employees who have left or been fired should have access to patient information should be revoked immediately. Finally, patients must be educated about their rights to view and even request corrections be made to their medical records. Patients need to know how they can get a copy of their records. Most importantly, patients need to know that medical identity theft is a crime and what they should do if they suspect their medical records or insurance information has fallen into the wrong hands. According to recent research, privacy and security issues are the direct result of weak access control.
Consequences
Violators of the identity theft laws can face civil fines that range between 100 and 50,000 dollars for each failure to meet privacy standards (Chester, 2003). Any person who knowingly violates these laws can face fines of up to 50,000 and one year in federal prison. Violators who knowing sell others medical information can be fined up to 250, 000 dollars and up to 10 years in federal prison (Chester, 2003). When a patient discovers that a breach of his/her medical information has occurred, it is nearly impossible to correct the error. The patient’s information becomes intertwined with the thief’s and segregating the patient’s information from the culprit is a daunting task. Medical identity theft can ruin one’s credit. Culprits often cause large hospital and specialty procedure bills in the victim’s name. Most importantly, fraudulent insurance claims can max out the victim’s policy limits and leave the victim with little or no coverage in time of an actual medical emergency or cause the victim’s his/her life due to medical mix up. For example, there was a case where a person died after receiving the wrong blood during a transfusion due to medical identity theft (Hacker, 2009).
Resolutions
The only way to stop medical identity theft is to improve patient identification methods and enhance data protection methods (Booz, 2009). One way to do this is by data encryption methods. Some researchers are suggesting a finger printing system that would be linked to each person’s insurance id number- often referred to as smart cards. This would ensure that the person receiving the medical service is actually the person that is issued that insurance number. Often patients are only asked to verbally assert their identity and coverage. In the era of technology, many options are available.
Consequences on the Health Field
More than 1.8 million Americans have experienced the effects of medical identity theft (Booz, 2009). The most dangerous aspect of medical identity theft is the fact that it could lead to the death of the victim due to misdiagnosis. One study conducted found that of the persons surveyed, fifteen percent of identity theft victims were misdiagnosed and fourteen percent were prescribed the wrong medicines (Hung, 2005). This creates liabilities for the health care field as wrongful death and malpractice suits could possibly be filed.
Conclusions
Eradicating identity theft will take time. Achieving levels of identity management that are required for electronic health records and other medical areas will not happen overnight. To ensure that medical identity theft is eradicated, both healthcare officials and patients must work together. Being vigilant is the key. Medical identity theft differs from personal identity theft because it can lead to the wrongful death of the victim. When the two person’s medical information become intertwined the victim may receive the wrong medicine or even have a procedure performed that is not needed.
References
Booz, A. H. (2009). Medical identity theft final report. U.S. Department of Health and Human Services.
Chestere, M. ( 2003). Abuse by the nhs: patient consent and confidentiality. Consumer Policy Review, Clinical Medicine, 13(2)
Hacker says he stole confidential medical data on 8 million Virginia residents (2009). Healthcare IT News.
Hung, P.K. (2005). Towards a privacy access control model for e-health services. Faculty of Business and Information Technology. University of Ontario Institute of Technology, Canada.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee