Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Abuse by the NHS: Patient Consent and Confidentiality, Essay Example

Pages: 4

Words: 1014

Essay

Introduction

Incidences of identity theft have been on the rise in recent years. Most recently, medical identity theft crimes have risen also-although this is something that most people never think about. When medical identity theft occurs, a thief uses the victims name and health insurance numbers to visit a doctor, purchase prescriptions, or get other forms of medical care. Electronic Patient Record is an electronic format that has practically replaced the traditional paper-based format. The use of modern technology has caused an increase in medical identity theft. A recent study found that nearly half of all medical identity thefts are the results of employee breaches (Healthcare, 2009). One incident occurred when a fired employee had hospital records on his personal laptop. The disgruntled worker leaked information about nearly 550 patient records from that medical facility (Healthcare, 2009). In some cases, medical personnel that have easy access to one’s medial information, uses the information to get prescription drugs to sell for profit or use to aid personal drug addictions. The theft culprits are, more often than not, doctors and medical personnel that understand how the insurance billing system operates. Medical identity theft is a fast growing problem that is wreaking havoc on individuals; therefore, one must know how to protect themselves, understand their legal rights, and be vigilant of personal information.

Protecting Yourself

Everyone must make themselves aware of how healthcare organizations and other entities use their personal information. One of the greatest challenges that the healthcare field faces today is developing a clear and enforceable privacy policy (Hung, 2005). When this is properly implemented, healthcare benefits are ensured. Communication between healthcare providers has become difficulty due to vocabulary and data exchange standards. Some countries are using safeguards to protect EPRs that monitor electronic records. Most in the healthcare field agree that EPR has made data exchange faster by speeding up diagnosis and reducing the cost of transferring and assessing medical records, but the main concern is client privacy and the risk of breaches that may allow sensitive information being trusted in the wrong hands. There are several ways the health care providers can ensure that clients’ information is protected. First, pre-employment background screenings is imperative. Any person with questionable criminal history should be eliminated from the possible candidates. Next, employees who have left or been fired should have access to patient information should be revoked immediately. Finally, patients must be educated about their rights to view and even request corrections be made to their medical records. Patients need to know how they can get a copy of their records. Most importantly, patients need to know that medical identity theft is a crime and what they should do if they suspect their medical records or insurance information has fallen into the wrong hands. According to recent research, privacy and security issues are the direct result of weak access control.

Consequences

Violators of the identity theft laws can face civil fines that range between 100 and 50,000 dollars for each failure to meet privacy standards (Chester, 2003). Any person who knowingly violates these laws can face fines of up to 50,000 and one year in federal prison. Violators who knowing sell others medical information can be fined up to 250, 000 dollars and up to 10 years in federal prison (Chester, 2003). When a patient discovers that a breach of his/her medical information has occurred, it is nearly impossible to correct the error. The patient’s information becomes intertwined with the thief’s and segregating the patient’s information from the culprit is a daunting task. Medical identity theft can ruin one’s credit. Culprits often cause large hospital and specialty procedure bills in the victim’s name. Most importantly, fraudulent insurance claims can max out the victim’s policy limits and leave the victim with little or no coverage in time of an actual medical emergency or cause the victim’s his/her life due to medical mix up. For example, there was a case where a person died after receiving the wrong blood during a transfusion due to medical identity theft (Hacker, 2009).

Resolutions

The only way to stop medical identity theft is to improve patient identification methods and enhance data protection methods (Booz, 2009). One way to do this is by data encryption methods. Some researchers are suggesting a finger printing system that would be linked to each person’s insurance id number- often referred to as smart cards. This would ensure that the person receiving the medical service is actually the person that is issued that insurance number. Often patients are only asked to verbally assert their identity and coverage. In the era of technology, many options are available.

Consequences on the Health Field

More than 1.8 million Americans have experienced the effects of medical identity theft (Booz, 2009). The most dangerous aspect of medical identity theft is the fact that it could lead to the death of the victim due to misdiagnosis. One study conducted found that of the persons surveyed, fifteen percent of identity theft victims were misdiagnosed and fourteen percent were prescribed the wrong medicines (Hung, 2005). This creates liabilities for the health care field as wrongful death and malpractice suits could possibly be filed.

Conclusions

Eradicating identity theft will take time. Achieving levels of identity management that are required for electronic health records and other medical areas will not happen overnight.  To ensure that medical identity theft is eradicated, both healthcare officials and patients must work together. Being vigilant is the key.  Medical identity theft differs from personal identity theft because it can lead to the wrongful death of the victim. When the two person’s medical information become intertwined the victim may receive the wrong medicine or even have a procedure performed that is not needed.

References

Booz, A. H.  (2009). Medical identity theft final report. U.S. Department of Health and Human Services.

Chestere, M. ( 2003). Abuse by the nhs: patient consent and confidentiality. Consumer Policy Review, Clinical Medicine, 13(2)

Hacker says he stole confidential medical data on 8 million Virginia residents (2009). Healthcare IT News.

Hung, P.K. (2005). Towards a privacy access control model for e-health services. Faculty of Business and Information Technology. University of Ontario Institute of Technology, Canada.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Two Models of the Criminal Process, Essay Example

“The two models of the criminal process?” means that two contrasting approaches that could be used to provide justice through the penal system. It means [...]

Pages: 3

Words: 755

Essay

Section 9 of Arbitration and Conciliation Act, Essay Example

Scenario One The modus operandi of the Bay Pines Rehabilitation Center dictates that patients have to sign paperwork that includes the arbitration requirements in the [...]

Pages: 2

Words: 560

Essay

School Firearm Violence, Essay Example

Scenario II – Second Amendment In most states, employees have the right to keep a firearm in their locked vehicle on company property. Employees are [...]

Pages: 1

Words: 404

Essay

Practical Managerial Skills for Leading a Multigenerational Workforce, Essay Example

Introduction Effective managerial communication is essential for achieving organizational goals, building relationships, and creating a positive work environment. As a result, managers need to be [...]

Pages: 3

Words: 915

Essay

Serpentine Leaf Miner, Essay Example

Vegetables form a significant part of the human diet due to their richness in minerals and vitamins. Australia grows a wide range of vegetables that [...]

Pages: 4

Words: 1048

Essay

Models, Methods, and Approaches to Celia’s Case, Essay Example

Social work relies on models, methods, and approaches to develop a clearer process that promises the success of the medical process. The right sections and [...]

Pages: 13

Words: 3547

Essay

Two Models of the Criminal Process, Essay Example

“The two models of the criminal process?” means that two contrasting approaches that could be used to provide justice through the penal system. It means [...]

Pages: 3

Words: 755

Essay

Section 9 of Arbitration and Conciliation Act, Essay Example

Scenario One The modus operandi of the Bay Pines Rehabilitation Center dictates that patients have to sign paperwork that includes the arbitration requirements in the [...]

Pages: 2

Words: 560

Essay

School Firearm Violence, Essay Example

Scenario II – Second Amendment In most states, employees have the right to keep a firearm in their locked vehicle on company property. Employees are [...]

Pages: 1

Words: 404

Essay

Practical Managerial Skills for Leading a Multigenerational Workforce, Essay Example

Introduction Effective managerial communication is essential for achieving organizational goals, building relationships, and creating a positive work environment. As a result, managers need to be [...]

Pages: 3

Words: 915

Essay

Serpentine Leaf Miner, Essay Example

Vegetables form a significant part of the human diet due to their richness in minerals and vitamins. Australia grows a wide range of vegetables that [...]

Pages: 4

Words: 1048

Essay

Models, Methods, and Approaches to Celia’s Case, Essay Example

Social work relies on models, methods, and approaches to develop a clearer process that promises the success of the medical process. The right sections and [...]

Pages: 13

Words: 3547

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!