<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; privacy</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Medical Identity Theft&#8211;The Next Big Thing?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/#comments</comments>
		<pubDate>Tue, 08 Nov 2011 14:08:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[medical identity theft]]></category>
		<category><![CDATA[patient privacy]]></category>
		<category><![CDATA[Ponemon]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=78</guid>
		<description><![CDATA[&#160; I was speaking with a friend the other day about Medical Identity Theft, HIPAA compliance and enterprise fraud management. We were discussing a survey report published in March by the Ponemon Institute that found roughly 1.5 million Americans are victims of medical ID theft. In the survey, fourteen percent of respondents said the breach [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>&nbsp;</p>
<p>I was speaking with a friend the other day about Medical Identity Theft, <a title="HIPAA compliance and enterprise fraud management" href="http://www.attachmate.com/solutions/managing-enterprise-fraud/industry/healthcare.htm">HIPAA compliance and enterprise fraud management</a>. We were discussing a survey report published in March by the Ponemon Institute that found roughly 1.5 million Americans are victims of medical ID theft. In the survey, fourteen percent of respondents said the breach occurred at a health care office, and 10% said employees at a health care organization&#8217;s office had stolen the data.</p>
<p> It occurred to me that medical identity theft is one of those “wild west” opportunities for identity thieves at the moment. While everyone is pretty familiar with the concept of financial fraud and what happens when your credit card information is stolen, what happens when someone pretends to be you to access medical care can have far more devastating consequences.</p>
<p>According to the Federal Bureau of Consumer Protection, here are some indications that might indicate that someone has been a victim of medical identity theft. Victims may:</p>
<ul>
<li>get a bill for medical services they didn’t receive;</li>
<li>be contacted by a debt collector about medical debt they don’t owe;</li>
<li>see medical collection notices on their credit report that they don’t recognize;</li>
<li>be told by their health plan that they’ve reached their limit on benefits; or</li>
<li>be denied insurance because their medical records show a condition they don’t have.</li>
</ul>
<p>Source: <a href="http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan">http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan</a></p>
<p>Whoa—think about that for a moment. Those are significant impacts. Then, spin the scenario out a bit further. What happens if medical records become co-mingled at the provider level? Can you get to a point where the records of the thief are entered into the medical history of the victim? According to the experts, you can. Back in 2006, Pam Dixon, founder of the World Privacy Forum, referenced the challenges that medical identity theft can create and cited examples of misinformation appearing in patient files. She also stated that changes to patient records could remain in the files for many years.</p>
<p><strong>Providers Protecting Privacy as Part of Their Healthcare Brand</strong></p>
<p>Leading healthcare organizations are increasingly seeing ways to protect their brand while safeguarding patient privacy. Moving the privacy discussion beyond the HIPAA disclosure form that all of us sign when accessing care and making ePHI protection a differentiator demonstrates a commitment on the part of the provider. When given a choice, my healthcare dollars are spent with those institutions that care enough about me to protect my personal information. It just makes sense to require the same level of accountability from my doctor as I do from my bank—the risks are just as real and the opportunity for damage may even be greater.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Considering Ethics in Security</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/considering-ethics-in-security/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/considering-ethics-in-security/#comments</comments>
		<pubDate>Wed, 02 Nov 2011 10:52:05 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Ethics]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[threats]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=67</guid>
		<description><![CDATA[Recently, on the heels of the ISSA International Conference, noted authority Michael Angelo raised the question of ethics in security. It is a topic that comes up from time to time and never ceases to fascinate me. In his recent blog posting, Michael writes “Ethics is a particularly interesting topic as the security industry is always [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Recently, on the heels of the <a title="ISSA International Conference" href="http://www.issa.org/conf/?p=105" target="_blank">ISSA International Conference</a>, noted authority Michael Angelo raised the question of ethics in security. It is a topic that comes up from time to time and never ceases to fascinate me. In his recent <a title="blog posting" href="http://community.netiq.com/blogs/security_webb/archive/2011/10/31/reflection-upon-the-issa-awards.aspx" target="_blank">blog posting</a>, Michael writes “Ethics is a particularly interesting topic as the security industry is always concerned about addressing issues in a constantly changing environment. It is easy to follow a set of ethics if the environment is consistent, however if the environment changes will those ethics still apply or do they need to evolve?”</p>
<p>Over the years, we’ve seen huge shifts in the issue of ethics and security. The spectrum of recent dialog ranges from securing end points and the interests of enterprise all the way to hacktivism. The core tenants of privacy, security and personal responsibility are all represented in the current debate. I was heartened to see the diversity of opinion expressed by our community. It shows that we are examining critical issues, considering the implications of choice and the why of new technologies rather than mindlessly favoring the technical possibilities</p>
<p>Michael concludes <a href="http://community.netiq.com/blogs/security_webb/archive/2011/10/31/reflection-upon-the-issa-awards.aspx">his article</a> by stating, “In the 70’s corporate and professional ethics demanded secrecy around all aspects of security. The corporate and professional ethics from the 70’s have gradually evolved to enable us to disclose information and work together on solutions so that we can not only survive but we can innovate and surpass our individual boundaries. In the end it is important to remember that while our environments are evolving we must re-examine our ethics and see if they also need to evolve.” I, for one, whole heartedly agree.</p>
<p>Here are some other positions on the issues of ethics in security:</p>
<p>ISACA: Auditors Ethics for Continuous Monitoring and Continuous Auditing: <a href="http://www.isaca.org/Journal/Past-Issues/2008/Volume-3/Pages/Auditor-Ethics-for-Continuous-Auditing-and-Continuous-Monitoring1.aspx">http://www.isaca.org/Journal/Past-Issues/2008/Volume-3/Pages/Auditor-Ethics-for-Continuous-Auditing-and-Continuous-Monitoring1.aspx</a></p>
<p>SANS: The Legal System and Ethics in Information Security: <a href="http://www.sans.org/reading_room/whitepapers/legal/legal-system-ethics-information-security_54">http://www.sans.org/reading_room/whitepapers/legal/legal-system-ethics-information-security_54</a></p>
<p>Dell SecureWorks: Crossing the Line: Ethics for the Security</p>
<p><a href="http://www.secureworks.com/research/articles/other%20articles/ethics/">http://www.secureworks.com/research/articles/other articles/ethics/</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/considering-ethics-in-security/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>