<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; Healthcare Fraud</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/category/healthcare/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>HIPAA and HITRUST for Healthcare: What&#8217;s the Difference?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hipaa-and-hitrust-for-healthcare-whats-the-difference/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hipaa-and-hitrust-for-healthcare-whats-the-difference/#comments</comments>
		<pubDate>Sun, 10 Feb 2013 23:13:59 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=207</guid>
		<description><![CDATA[Healthcare institutions are working hard to map audit and compliance efforts throughout their organization&#8211;especially across critical applications and mainframe systems with legacy applications. All of this effort will result in more secure EHRs and improvements in patient privacy protections. But in a world of constrained resources, where should care providers focus the bulk of their [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Healthcare institutions are working hard to map audit and compliance efforts throughout their organization&#8211;especially across critical applications and mainframe systems with legacy applications. All of this effort will result in more secure EHRs and improvements in patient privacy protections. But in a world of constrained resources, where should care providers focus the bulk of their improvements? Oftentimes, it comes down to priorities&#8211;the organizational objectives&#8211;that will drive the process.</p>
<p>As related in a recent whitepaper from Coalfire, Andrew Hicks shares the following distinctions:<br />
&#8220;HIPAA and HITRUST assessments each share the common objective of safeguarding healthcare information, however the similarities end there. A HIPAA Security assessment will provide an organization reassurance that when all audit recommendations have been resolved, the organization will be compliant with the HIPAA requirements. </p>
<p>A HITRUST assessment and certification, on the other hand, takes a more risk-based approach, scaling the requirements to the risk characteristics of the organization and focusing on controls related to the leading causes of breaches in the healthcare industry. This approach also considers compliance with regulations such as HIPAA, allowing organizations to take a more holistic approach towards protecting sensitive information.&#8221;<br />
(To access this whitepaper, look for &#8220;HIPAA versus HITRUST &#8211; FAQ&#8221; by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead, Coalfire Systems, Inc. www.coalfire.com)</p>
<p>For leading healthcare institutions, checking the box for HIPAA compliance is often not enough. These organizations focus instead on addressing risks to patient information and potential security violations. In cases where the priority is protecting patient data and safeguarding access to EHRs (electronic health records) is paramount, the priority shifts to address risk across the organization.</p>
<p>In one of our recent engagements, a major care facility in the north east was seeking to understand access to patient records. Here are some of the things they wanted to be able to examine as part of their approach to risk:<br />
•	VIP record snooping<br />
•	Executive record snooping<br />
•	Patient / employee record snooping<br />
•	Family member and self -examination of records<br />
•	Neighbor record snooping<br />
•	Identity Theft<br />
•	Medical Identity Theft<br />
•	Areas of potential non-compliance with federal and state regulations</p>
<p>Monitoring for these indicators and correlating that data across multiple systems was well within Luminet’s capabilities. In addition to capturing EPIC, Kronos, Cerner, Meditech, and other log data, the Luminet solution was able to monitor the existing mainframe applications and correlate that information so that is alerted on suspicious activity in real-time.</p>
<p>Then, as part of a comprehensive risk approach, we were able to add visibility into the hospital’s accounting and payroll systems. Luminet’s ability to monitor Lawson and other accounting systems enabled a new level of visibility and added clarity to the financial operations side of the house. This benefit wasn’t available with other monitoring systems focused exclusively on EHR and patient data.<br />
When considering whether to address HIPAA or HITRUST concerns, organizations would be well served to take a long view and invest in systems flexible enough to meet their present and future needs. A number of modern systems can address HIPAA, PCI-DSS, state regulations like SB 1386, Meaningful Use, and Accounting of Disclosure.  But if it is time to make an investment, wouldn’t it be best to select a technology partner and a solution that can help address risk across all your critical systems? </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hipaa-and-hitrust-for-healthcare-whats-the-difference/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HITECH, Meaningful Use and the 5 Pillars of Health Outcomes</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hitech-meaningful-use-and-the-5-pillars-of-health-outcomes/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hitech-meaningful-use-and-the-5-pillars-of-health-outcomes/#comments</comments>
		<pubDate>Thu, 08 Nov 2012 15:07:27 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=225</guid>
		<description><![CDATA[The Meaningful Use program was first established by the U.S. Federal Government as part of the 2009 HITECH Act. The goal was to foster the creation of the infrastructure needed to support healthcare reform. As the 2014 deadline for Meaningful Use Stage 2 draws closer, organizations are planning now for improvements in the way they [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The Meaningful Use program was first established by the U.S. Federal Government as part of the 2009 HITECH Act. The goal was to foster the creation of the infrastructure needed to support healthcare reform. As the 2014 deadline for Meaningful Use Stage 2 draws closer, organizations are planning now for improvements in the way they provide privacy protection and data security for PHI. While moving toward these goals is important, it might be good to take a step back and consider how we got here.</p>
<p>According to the CDC, the original concept of meaningful use rested on the &#8217;5 pillars&#8217; of health outcomes policy priorities. These are: </p>
<p>1.  Improving quality, safety, efficiency, and reducing health disparities<br />
2.  Engage patients and families in their health<br />
3.  Improve care coordination<br />
4.  Improve population and public health<br />
5.  Ensure adequate privacy and security protection for personal health information </p>
<p>To encourage the transitions necessary to create greater efficiencies, improved information sharing, and better protections for patient privacy, an incentive program was established to support the &#8220;meaningful use&#8221; of a certified &#8220;Electronic Health Record&#8221; (EHR). This initiative was rolled out in stages:</p>
<p>Meaningful Use Stage 1:<br />
The first stage of Meaningful Use emphasizes proper data capture and data sharing&#8211;primarily focusing on the transition from paper records to electronic records generally referred to as EHRs or EMRs. </p>
<p>What are the Requirements of Stage 1 Meaningful Use?<br />
• Reporting through attestation; Reporting period is 90 days for first year and 1 year subsequently<br />
• To meet certain objectives/measures, 80% of patients must have records in the certified EHR technology</p>
<p>Eligible Professionals must complete:<br />
• 15 core objectives, 5 objectives out of 10 from menu set<br />
• 6 total Clinical Quality Measures (3 core or alternate core, and 3 out of 38 from additional set)</p>
<p>Hospitals must complete:<br />
• 14 core objectives, 5 objectives out of 10 from menu set<br />
• 15 Clinical Quality Measures </p>
<p>* For a complete listing of these objectives, refer to: http://www.healthit.gov/sites/default/files/pdf/FINAL_MU_RECOMMENDATIONS_TABLE.pdf</p>
<p>As hospitals increasingly move toward electronic records, it is assumed that the first four pillars of health outcomes policy will improve. However, the fifth pillar, ensuring adequate privacy and security protection for personal health information, may require additional actions by hospitals and care providers.<br />
Specifically, organizations must take additional measures to safeguard patient records and guarantee privacy. Leading institutions and others must consider how to move beyond “checking the box for compliance” and move toward addressing risks to patient data. In our next post, we’ll discuss how that can be done and how it becomes increasingly more important as organizations address Meaningful Use Stages 2 and 3.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hitech-meaningful-use-and-the-5-pillars-of-health-outcomes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Most Common HIPAA Violation? Small-Scale Snooping</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/most-common-hipaa-violation-small-scale-snooping/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/most-common-hipaa-violation-small-scale-snooping/#comments</comments>
		<pubDate>Tue, 14 Aug 2012 20:04:49 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=184</guid>
		<description><![CDATA[Health privacy violations are lethal. They can create reputation management nightmares and generate stiff fines. Even a single HIPAA violation has serious financial consequences. The minimum fine now stands at $50,000, with a maximum penalty per year of up to $1.5 million per each provision of the rules. Since many healthcare privacy breaches involve multiple [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Health privacy violations are lethal. They can create reputation management nightmares and generate stiff fines. Even a single HIPAA violation has serious financial consequences. The minimum fine now stands at $50,000, with a maximum penalty per year of up to $1.5 million per each provision of the rules. Since many healthcare privacy breaches involve multiple violations, the cost of not protecting patient privacy can grow very quickly. We’ve even begun to see this demonstrated in the more recent HIPAA compliance enforcement actions. Care providers large and small are feeling the pressure. Even government agencies are not immune. </p>
<p>While headline-grabbing events like the HIPAA fine levied at the State of Alaska are being widely covered, there is another, hidden reality that is far more pervasive: Small-scale snooping is actually far more common than large scale theft or dramatic losses of equipment containing PHI. In fact, in the 2011 Survey of Patient Privacy Breaches*,  about 70% of the survey respondents  reported that they had experienced a HIPAA breach of some level—with the majority of those violations occurring as a result of snooping activity. Insiders were responsible for the majority of breaches, with 35 percent snooping into medical records of fellow employees and 27 percent accessing records of friends and relatives. More than half of the respondents stated that they lacked the appropriate tools for monitoring inappropriate access to PHI.</p>
<p>Organizations will continue to be held accountable for responding to audit and information requests. There are tools, like Attachmate Luminet, that support HIPAA compliance reporting requirements and Accounting of Disclosure requests are available today.  These leading solutions exist to help stop misuse and curtail privacy violations by seeing, recording, and analyzing user activity across all applications. In this way, these solutions can help you address a wide variety of PHI access and policy scenarios. When examining technology of this kind, make sure it can help you answer the following questions: </p>
<p>•	Is an employee logged in at multiple locations or accessing systems after hours while on vacation or absent from work?<br />
•	Is an employee accessing areas not appropriate for their job or function?<br />
•	Are physicians accessing records outside their specialty?<br />
•	Are employees accessing high profile or VIP accounts inappropriately?<br />
•	Are employees inappropriately accessing PHI within the institution?<br />
•	Are employees accessing accounts more than 30 days after the date of service? Has key account information—e.g., address or services rendered—changed?</p>
<p>When evaluating a solution provider, look for the ability to see beyond logs—to capture the query-only activity that happens when staff and care providers only want a “quick peek.” It may seem like harmless curiosity, but it represents a privacy violation that can land an institution into very hot water. </p>
<p>*The 2011 Survey of Patient Privacy Breaches was conducted by Veriphyr.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/most-common-hipaa-violation-small-scale-snooping/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Major security breaches hit healthcare</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/#comments</comments>
		<pubDate>Tue, 01 May 2012 23:28:38 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threats]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=143</guid>
		<description><![CDATA[The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost. And it was the work of insiders. According to an article entitled “Healthcare Unable to Keep Up [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost.  </p>
<p>And it was the work of insiders.</p>
<p>According to an article entitled “Healthcare Unable to Keep Up with Insider Threats” by Ericka Chickowski on the Dark Reading website, the three incidents are typical of “the types of consequences healthcare organizations face when they fail to address insider threats through improved employee screening, monitoring, data controls, and security awareness training.”.</p>
<p>These insider threats were and are potentially malicious and at the very least inept. In the case of the UDH, records were exposed due to the misconfiguration of a server containing the files. At Emory, human error accounted for the loss of a significant number of patient records when 10 backup disks went missing. In South Carolina, a DHHS employee (who has since been fired and arrested) sent thousands of Medicaid patient records to himself in an email.</p>
<p>The healthcare industry, by and large, “has been notoriously incapable of pinpointing risks in general, let alone those from insiders,” the article offers. Sourcing the problem is difficult because these security holes include loss or theft of portable devices such as laptops, smartphones, external drives and backup tapes; actual theft by data thieves; and simple staff ignorance in terms of security, protocol and training.</p>
<p>With solutions available today, those institutions could easily tell the difference between intentional and non-intentional privacy violations, achieve full regulatory compliance, and pass any audit with real-time user activity log files. As the “insider threat” continues to grow right along with the healthcare industry, major steps will need to be taken to stanch the flow of lost and misappropriated records that can and will lead to increased fraud and identity theft. The time to act is now. </p>
<p>To learn more about Attachmate’s Luminet enterprise fraud management software please visit http://www.attachmate.com/Products/efm/luminet/luminet.htm.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Importance of Continuous Monitoring in Healthcare</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/the-importance-of-continous-monitoring-in-healthcare/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/the-importance-of-continous-monitoring-in-healthcare/#comments</comments>
		<pubDate>Wed, 23 Nov 2011 21:59:18 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[data logs]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[patient privacy]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=97</guid>
		<description><![CDATA[Today’s next generation of fraud detection technologies can go a long way to supporting a HIPAA HITECH compliance effort and prevent privacy violations, misuse and abuse. Simply put, these systems provide visibility across multiple data channels to offer a comprehensive view of what is going on in your environment. Leading solutions offer screen-by-screen replay of [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Today’s next generation of <a title="fraud detection" href="http://www.attachmate.com/solutions/managing-enterprise-fraud/industry/healthcare.htm">fraud detection</a> technologies can go a long way to supporting a HIPAA HITECH compliance effort and prevent privacy violations, misuse and abuse. Simply put, these systems provide visibility across multiple data channels to offer a comprehensive view of what is going on in your environment. Leading solutions offer screen-by-screen replay of user activity which offers “context to keystrokes” and provides the ability to look at each screen viewed by a particular user. Through this method, organizations can understand and capture the “why” of data access. Monitoring and alerting on specific events is also available. These solutions can actively target violations and unauthorized access.</p>
<p>More and more, leading healthcare institutions are migrating to the new fraud monitoring technologies. This new approach moves far beyond the logging and monitoring solutions that may &#8220;check a box&#8221; for compliance, but do little to address advanced audit requirements or fill in the &#8220;gaps&#8221; inherent in traditional logging systems. The benefits of monitoring data across applications and extending visibility beyond healthcare applications are essential to leading organizations seeking to protect patient privacy and their brand.</p>
<p>Let&#8217;s explore some of the areas that this new approach can assist with:</p>
<h2>Common Healthcare Monitoring Scenarios</h2>
<ul>
<li>Is a given user is logged in at multiple locations or while on vacation or absent from work? Accessing systems after hours?</li>
<li>Is a particular user is accessing areas not appropriate for their job or function?</li>
<li>Are physicians are accessing records outside their specialty?</li>
<li>Are employees accessing high profile or VIP accounts inappropriately? Are staff members inappropriately accessing PHI within the institution?</li>
<li>Are users accessing accounts more than 30 days after the date of service? Has key information on the account changed (address, services rendered, etc.)?</li>
</ul>
<p>In healthcare, one of the most pernicious issues is accidental access of PHI rather than outright fraud (although fraud is still an issue). Take for example, improper record access in healthcare. While certainly a HIPAA violation, few would consider the desire to “sneak a peek” at an admission file fraud. Even so, these violations cost hospitals hundreds of thousands of dollars in fines annually and the resulting personnel action results in loss of staff and productivity. Fortunately, there is a better way.</p>
<p><strong> </strong></p>
<h2>Developing A Rules Based Approach</h2>
<p>Continuous monitoring of user activity provides a comprehensive view of who, did what, when, and often even provides insight into why a particular activity occurred. Capturing data in this manner and applying a rules based approach to identifying risks and possible abuse, misuse and error in data can significantly improve audit performance.</p>
<p>&nbsp;</p>
<h2>Auditing Needs We Commonly Encounter and Assist With</h2>
<ul>
<li>Developing a baseline of activity across a healthcare organization and using that to uncover and target areas at higher risk for patient privacy violations.</li>
<li>Monitoring third-party activities, including call centers and claims processors and service providers, for a higher than baseline occurrence of out of band activity.</li>
<li>Monitoring access to medical record, specifically highly sensitive material such as HIV test results where the inappropriate disclosure of such information may cause a patient harm.</li>
<li>Identifying employees or other providers who demonstrate patterns of unauthorized access. Providing visibility into record access of VIP, high profile or opt out patients.</li>
<li>Examining employee or provider look ups along high risk patterns: same last name, same street address, same zip code, etc.</li>
<li>Enabling review of physician access and review of employee as patient access (employees as patients create a potential for misuse and/or abuse often out of concern or curiosity).</li>
<li>Reviewing and auditing access by remote users. Providing the ability to review external third-party record access as well as the ability to monitor third-party activity for fraud, out-of-band approvals or requests and access appropriate to role.</li>
</ul>
<p>&nbsp;</p>
<h2>Monitoring and Data Capture During a “Break Glass” Emergency</h2>
<p>In many healthcare provider settings, there is the potential for a “break-the-glass” emergency which refers to an instance where it becomes necessary for individuals to violate access protocols to provide lifesaving or critical care. In these scenarios, it is essential to capture, document and retain user activity and information access for future audit and review. With enterprise fraud management solutions in place, this special audit trail is automatically created, encrypted and digitally signed. The records are retained in a sealed repository preserving the records as required.</p>
<p>&nbsp;</p>
<p>Possible scenarios where this data capture may be required include a) account problems such as a locked password due to failed entry attempts or lack of a user account (visiting clinician required to assist during an emergency), b) authentication problems such as an authentication system failure, or c) an emergency situation forces personnel to respond in a way that exceeds their authorization.</p>
<p>During such a situation, it is essential that the entire activity trail is captured and preserved for later review. With monitoring in place, no paper logging is required. Today’s enterprise fraud management technologies can even trigger alerts when such a scenario occurs. Having an automatic, comprehensive audit trail has the potential to limit any required disclosure to the actual event and activity rather than a “worst case” access scenario.</p>
<h2>Responding to Emerging “Accounting of Disclosure Requirements”</h2>
<p>Lastly, an additional area to consider is responding to patient requests for information surrounding PHI access. Current proposed Federal legislation would require that healthcare providers and their affiliates respond to requests for information with a detailed accounting of all access to a patient’s PHI going back three years. Many forward looking institutions are seeking a way to respond to this new proposed requirement as well as state disclosure laws governing PHI. Many Enterprise Fraud Management systems are designed to handle these information requests at the press of a button and can capture the history of information access across multiple systems. Having these systems in place can mean countless saved hours in responding to these requests.</p>
<p><strong>In Conclusion:</strong></p>
<p>Leading healthcare institutions seeking to get more out of their audit and compliance efforts should be exploring next generation solutions and not relying exclusively on incomplete or inadequate logs.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/the-importance-of-continous-monitoring-in-healthcare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Medical Identity Theft&#8211;The Next Big Thing?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/#comments</comments>
		<pubDate>Tue, 08 Nov 2011 14:08:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[medical identity theft]]></category>
		<category><![CDATA[patient privacy]]></category>
		<category><![CDATA[Ponemon]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=78</guid>
		<description><![CDATA[&#160; I was speaking with a friend the other day about Medical Identity Theft, HIPAA compliance and enterprise fraud management. We were discussing a survey report published in March by the Ponemon Institute that found roughly 1.5 million Americans are victims of medical ID theft. In the survey, fourteen percent of respondents said the breach [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>&nbsp;</p>
<p>I was speaking with a friend the other day about Medical Identity Theft, <a title="HIPAA compliance and enterprise fraud management" href="http://www.attachmate.com/solutions/managing-enterprise-fraud/industry/healthcare.htm">HIPAA compliance and enterprise fraud management</a>. We were discussing a survey report published in March by the Ponemon Institute that found roughly 1.5 million Americans are victims of medical ID theft. In the survey, fourteen percent of respondents said the breach occurred at a health care office, and 10% said employees at a health care organization&#8217;s office had stolen the data.</p>
<p> It occurred to me that medical identity theft is one of those “wild west” opportunities for identity thieves at the moment. While everyone is pretty familiar with the concept of financial fraud and what happens when your credit card information is stolen, what happens when someone pretends to be you to access medical care can have far more devastating consequences.</p>
<p>According to the Federal Bureau of Consumer Protection, here are some indications that might indicate that someone has been a victim of medical identity theft. Victims may:</p>
<ul>
<li>get a bill for medical services they didn’t receive;</li>
<li>be contacted by a debt collector about medical debt they don’t owe;</li>
<li>see medical collection notices on their credit report that they don’t recognize;</li>
<li>be told by their health plan that they’ve reached their limit on benefits; or</li>
<li>be denied insurance because their medical records show a condition they don’t have.</li>
</ul>
<p>Source: <a href="http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan">http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan</a></p>
<p>Whoa—think about that for a moment. Those are significant impacts. Then, spin the scenario out a bit further. What happens if medical records become co-mingled at the provider level? Can you get to a point where the records of the thief are entered into the medical history of the victim? According to the experts, you can. Back in 2006, Pam Dixon, founder of the World Privacy Forum, referenced the challenges that medical identity theft can create and cited examples of misinformation appearing in patient files. She also stated that changes to patient records could remain in the files for many years.</p>
<p><strong>Providers Protecting Privacy as Part of Their Healthcare Brand</strong></p>
<p>Leading healthcare organizations are increasingly seeing ways to protect their brand while safeguarding patient privacy. Moving the privacy discussion beyond the HIPAA disclosure form that all of us sign when accessing care and making ePHI protection a differentiator demonstrates a commitment on the part of the provider. When given a choice, my healthcare dollars are spent with those institutions that care enough about me to protect my personal information. It just makes sense to require the same level of accountability from my doctor as I do from my bank—the risks are just as real and the opportunity for damage may even be greater.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The Challenges of HIPAA Compliance</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/the-challenges-of-hipaa-compliance/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/the-challenges-of-hipaa-compliance/#comments</comments>
		<pubDate>Tue, 25 Oct 2011 13:15:41 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Insurance Fraud]]></category>
		<category><![CDATA[Analytics]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[data logs]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[security logs]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=59</guid>
		<description><![CDATA[Meeting the Challenge of HIPAA Compliance HIPAA, the Final Privacy rule and various state regulations governing patient privacy all have one thing in common. They all require organizations to demonstrate access to PHI on a minimum need-to-know basis. That places the burden of governing access on the institution. In an audit situation, that means the [...]]]></description>
			<content:encoded><![CDATA[<p></p><p><strong><em>Meeting the Challenge of HIPAA Compliance</em></strong></p>
<p>HIPAA, the Final Privacy rule and various state regulations governing patient privacy all have one thing in common. They all require organizations to demonstrate access to PHI on a minimum need-to-know basis. That places the burden of governing access on the institution. In an audit situation, that means the organization must be able to demonstrate “Who? Did what? When?” and present a comprehensive record of information access. In an ideal situation, this would be merely a matter of printing out some access logs and shoring up areas of weakness, right? Sounds simple enough, doesn’t it?</p>
<p><strong>Mind the Gap—Insufficient data capture leads to incomplete audit trails</strong></p>
<p>However, HIPAA compliance still proves to be illusive at a number of hospitals and healthcare institutions. The transition to electronic records and the sheer volume of data have made the situation challenging at best. Further complicating matters are the gaps that are present in current log files and systems. Traditional logging methods only capture about 25% of the data—leaving huge gaps in the PHI audit trail. Even worse, the Privacy Rule requires an explanation of “why” the data was accessed so audit information created with the Privacy rule in mind has to go beyond the login name, date/timestamp and action taken to provide context to the data access. This is data that is just plain missing from most traditional system logs—they were never designed to capture it. With HIPAA fines at some hospitals exceeding $1 million, solutions to the missing data problems must be found.</p>
<p><strong>Raising the Bar—HITECH adds new challenges to compliance efforts</strong></p>
<p>As of February 2010, the Health Information Technology for Economic and Clinical Health (HITECH) Act made significant changes to the Health Information Portability and Accountability Act (HIPAA) of 1996. These changes include: strengthening of the data breach notification laws with specific guidance on breach disclosure, specifications surrounding PHI access disclosure, and the ability to impose larger fines. The HITECH Act also extends the data protection requirements beyond the individual organization to include business associates as well. Organizations seeking to demonstrate compliance with the new guidelines must be able to specify the details of any given access event to limit fines and ensure that any breach disclosure accurately reflects the size of the occurrence.  For example, in the absence of data to quantify the actual PHI access, organizations must report on the highest possible number of records. Knowing precisely who accessed what can permit an organization to disclose what actually happened (the viewing of a handful of records versus accessing a database with thousands of patient accounts) thereby limiting fines and potential brand damage. Inadequate logs that leave auditors and investigators guessing can’t do that. Only the next generation of detection technologies, Enterprise Fraud Management and Misuse solutions, can do that.</p>
<p><strong>Enterprise Fraud and Misuse Management: Using next generation fraud technologies</strong></p>
<p>Today’s next generation of fraud detection technologies can go a long way to supporting a HIPAA HITECH compliance effort. Simply put, these systems provide 100% visibility across multiple data channels to offer a comprehensive view of what is going on in your environment. A few even offer screen-by-screen replay of user activity which offers “context to keystrokes” and provides the ability to look at each screen viewed by a particular user. Through this method, organizations can understand and capture the “why” of data access. Monitoring and alerting on specific events is also available. These solutions can actively target violations and unauthorized access. <strong>Here are a few of the common monitoring scenarios:</strong></p>
<ul>
<li>Is a given user is logged in at multiple locations or while on vacation or absent from work? Accessing systems after hours?</li>
<li>Is a particular user is accessing areas not appropriate for their job or function?</li>
<li>Are physicians are accessing records outside their specialty?</li>
<li>Are employees accessing high profile or VIP accounts inappropriately? Are staff members inappropriately accessing PHI within the institution?</li>
<li>Are users accessing accounts more than 30 days after the date of service? Has key information on the account changed (address, services rendered, etc.)?</li>
</ul>
<p>In healthcare, one of the most pernicious issues is accidental access of PHI rather than outright fraud (although fraud is still an issue). Take for example, VIP snooping in healthcare. While certainly a HIPAA violation, few would consider the desire to “sneak a peek” at an admission file fraud. Even so, these violations cost hospitals hundreds of thousands of dollars in fines annually and the resulting personnel action results in loss of staff and productivity. Fortunately, there is a better way.</p>
<p>Lastly, an additional area to consider is responding to patient requests for information surrounding PHI access. Current proposed Federal legislation would require that healthcare providers and their affiliates respond to requests for information with a detailed accounting of all access to a patient’s PHI going back three years. Many forward looking institutions are seeking a way to respond to this new proposed requirement as well as state disclosure laws governing PHI. Many Enterprise Fraud Management systems are designed to handle these information requests at the press of a button and can capture the history of information access across multiple systems. Having these systems in place can mean countless saved hours in responding to these requests.</p>
<p>&nbsp;</p>
<p><strong>Gartner Report on EFM</strong></p>
<p>The financial services sector has been an early adopter of EFM systems, since fraudsters often target financial accounts (because that&#8217;s where the money is); however, other sectors, such as healthcare, insurance and government, are increasingly purchasing fraud and misuse management systems, often to respond to government regulations.*</p>
<p>If your organization is interested in learning more about how these systems can support t your tactical fraud and misuse prevention objectives (i.e., for a specific product or channel), I encourage you to download the current Gartner MarketScope on Enterprise Fraud Management and Misuse. This independent report, authored by leading analyst Avivah Litan, provides overview information about how organizations are using these technologies today as well as reviews of solutions and providers in the category. Download your complimentary copy now: <a href="http://www.attachmate.com/info/Gartner-EFM/bridge-pr.htm">Get the Gartner report</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div><br clear="all" /></p>
<hr align="left" size="1" width="33%" />
<div>
<p>* Gartner, Inc, <strong>MarketScope for Enterprise Fraud and Misuse Management, Avivah Litan, 14 January 2011</strong></p>
<p>&nbsp;</p>
</div>
</div>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/the-challenges-of-hipaa-compliance/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>