Network World - Identity thieves are not only interested in tapping financial resources, but are also after your medical identification data and services.
Medical identity theft typically involves stolen insurance card information, or costs related to medical care and equipment given to others using the victim's name. Roughly 5.8% of American adults have been victimized, according to a new survey from The Ponemon Institute. The cost per victim, on average, is $20,160.
"The National Study on Medical Identity Theft" is based on findings from 156,000 people who agreed to discuss identity theft in general. Among those surveyed, 5.8% provided specific details about how they had been hit by medical ID theft, in particular. Extrapolating to the general U.S. population, that means an estimated 1.42 million adults in this country may have experienced some type of fraud involving theft of their medical identification information, the report claims.
Medical ID theft is when "someone uses someone else's insurance information to get services or goods," says Jennifer Leuer, general manager at the ProtectMyID business unit at Experian, which sponsored the survey to get a sense of how big medical ID theft is in the United States. The fallout of medical ID fraud is that the victim is forced to sort out what happened with doctors, hospitals, insurance companies, credit agencies and sometimes even lenders that may have granted a loan for medical reasons.
According to the survey, 29% of victims of medical ID theft discovered the problem a year after the incident, and 21% said it took two or more years to learn about it. The average cost of sorting out the mess was $20,160, which might include making out-of-pocket payments to a health plan provider to restore coverage. Nearly half of the victims (48%) lost coverage due to medical ID theft. Roughly 75% found resolution difficult, and only about 25% said there were no consequences due to the theft.
Among the victims surveyed, 46% did not report the incident to law enforcement or other legal authorities, according to the report, and 33% said the medical ID theft occurred because a family member used their medical ID for goods and services without their knowledge. Other medical ID thefts were attributed to a lost wallet with insurance card in it, and a data breach that exposed patient information.
Leuer says individuals should always take the step to notify law enforcement about a suspected medical ID incident.
Read more about wide area network in Network World's Wide Area Network section.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts