Medical Identity Theft: What It Is and How to Protect Yourself

Medical Identity Theft: What It Is and How to Protect Yourself

If you’re like most people, you’re probably aware of the concept of identity theft. A criminal gets access to enough of your personal information to pretend to be you. They use that information to open new credit cards, get new loans, or even buy a new car or house in your name. Since it’s in your name, you’re stuck with the bill. The financial impact can be horrible, and the recovery process can be long, complicated, and frustrating. But with most identity theft, the impact is purely financial. But that’s not the case with medical identity theft.

In addition to financial consequences, this type of identity theft can affect your medical care and put your health at risk. Even worse, many people don’t know anything about it. And if you don’t know it’s a possibility, you may not realize it’s happened until the consequences start affecting you.

What is Medical Identity Theft?

In regular identity theft, the thief uses your information to pretend to be you to get credit cards or loans in your name. In medical identity theft, the principle is the same, but the benefits are different. What makes it unique is that in this case, the thief uses your information to pretend to be you while getting medical care. By doing this, they can use your health insurance benefits and the final bill goes to you. Essentially, they get whatever medical care they want or need on your dime.

The Consequences of Medical Identity Theft

Some of the consequences of medical identity theft are similar to what you see in regular identity theft. Fraudulent bills in your name can lead to financial stress. If the bills go to collections, it could damage your credit report.

However, because it affects your health insurance and medical records, it can also have consequences in your ability to get medical care – or even endanger your life. If the thief uses too many of your insurance benefits, you may find yourself without coverage for a future situation. You could get denied care at a medical establishment because of the thief’s actions. Your health insurance premiums could go up or even denied coverage altogether.

It could also have legal consequences. In some cases of medical identity theft, the thief has used the victim’s identity to obtain large amounts of controlled substances through prescriptions. If anyone catches on, they could report the thief – and the information attached to the activity is yours. You could end up arrested or worse.

If the thief’s medical information gets combined with yours and causes your records to become inaccurate, that could have dangerous, even deadly consequences. For example, if the thief’s blood type is entered into your medical record and you need a blood transfusion, you could receive the wrong type of blood, which could be fatal. Or you could receive an inaccurate diagnosis and get treated for the wrong thing because of inaccuracies in your medical records.

How Identity Thieves Get Your Information

Medical identity theft requires the thief to get their hands on two different types of information. First is identifying information about you. Often your name, birthday, and address are enough, but some will go after your social security number as well. Second, in order to fraudulently use your health insurance benefits, they need to get your insurance information.

There are several ways a hopeful thief can get this information. They could use social engineering on either you or your medical provider. People often don’t consider their health insurance information to be extremely confidential. Many of us wouldn’t think twice about “verifying” our identity and insurance information if the caller claimed to be with your doctor’s office.

Another way identity thieves could get your information is through data breaches. Hackers target medical institutions and health insurance companies just as much as they target other types of companies. They may also go after doctor’s offices and other practices to get the data. Sometimes the criminals will try to get the information themselves, but much more often they will buy it from the person who actually accessed the data.

Finally, and least commonly, they could get the information from ordinary theft in the physical world. If they steal your purse or wallet that has your ID and your insurance card, that’s all the information they need. Or they could steal a piece of mail from your insurance company. That will give them most of what they need to steal your identity for medical purposes.

How to Find Out if You’re a Victim

If you want to find out if a criminal opened a new credit card or took out a loan in your name, you can check your credit report. Everyone is entitled to a free copy of their credit report once a year, and there are apps out there that allow constant monitoring. But there isn’t a credit report for medical care. Unfortunately, watching for medical identity theft isn’t as easy as reviewing a credit report or checking an app. But there are a few steps you can take to spot when it happens.

Read Your Explanation of Benefits

Every time you or anyone on your health insurance plan get medical care, your insurance company will send you a document called an “Explanation of Benefits,” sometimes shortened to “EOB.” This is a list of all the care that was provided and how much your insurance covered. You may get these statements in the mail or digitally on your insurance provider’s website.

When you get these statements, go over them carefully. Watch for care listed that you or someone else covered by your plan didn’t receive, or care received at provider you’ve never been to. It may be an indication that someone at your provider’s office put in the wrong billing code, or your insurance got something wrong. Or it may be a sign that you’re a victim of medical identity theft. Either way, it bears investigating. Contact your provider immediately.

Watch for Suspicious Bills

Every time you get a medical bill, read it over carefully. Confirm that it’s for a service you, someone in your household, or someone on your health insurance plan actually received. If you are getting bills for services you never received, that’s an indication that something is wrong. Either the provider has made a major error in their billing or you are a victim of medical identity theft. Regardless of the cause, it’s time to call the provider and dispute the bill.

Check Your Medical Records

Ask your medical providers for a complete copy of your medical records. Under HIPAA regulations, you are entitled to a copy of your records. Some providers require a written request, so ask how you should request this access. Once you have the records, go through them thoroughly. Look for anything that’s not correct or accurate.

Just because there are a few inaccuracies doesn’t necessarily mean you have been a victim of medical identity theft. It’s possible that the provider’s office may have recorded something incorrectly, or there was an administrative error, such as staff mixing up two patients with the same name. But if you find something incorrect, you should still take action. Follow the other steps in this section to check for other signs of medical identity theft. And contact your provider to request your records be corrected.

If your records are accurate, or after you have a copy with corrections and have verified that it’s correct, keep a copy somewhere safe. That will make it easier to resolve problems with your medical records if you become a victim of medical identity theft in the future.

Check Your Credit Report

Yes, it’s true that medical bills don’t generally show up on your credit report. But if any of them go to collections, that will affect your credit and you will be able to see it. You should be checking your credit report regularly anyway to watch for inaccuracies or indications of ordinary identity theft. When you do so, also check for new collections accounts regarding medical debt. Those could indicate that your were a victim of medical identity theft.

What to Do if You’re a Victim of Medical Identity Theft

If you determine you are a victim of medical identity theft, take action. Identity theft does not improve by being left alone. And if you need medical care before the situation is resolved, you may not be able to get it, or the care may be incorrect or even harmful.

First, deal with the issue that first informed you of the situation. If it was an inaccurate bill from a provider or something incorrect on your medical records, contact the provider. If it was something on an Explanation of Benefits from your insurance provider, contact your insurance. Collections accounts on your credit report can be disputed with the credit agency.

Next, report the theft to the Federal Trade Commission at identitytheft.gov. This also gives you the option to get an Identity Theft Affidavit, which is an official legal document saying you have been the victim of identity theft. This can be helpful in disputing bills and accessing resources.

Third, file fraud alerts. Contact your health insurance provider’s fraud department and explain that you have been a victim of medical identity theft. They may want a copy of your FTC report or affidavit. File fraud alerts with the three major credit reporting agencies and get copies of your credit report. And contact every medical provider, explain the situation, and ask for a copy of your current medical records. Consider filing a police report, as well. That extra documentation could help with your case.

Finally, it’s time to go through the documents. Look carefully at your credit reports and dispute any inaccuracies. Go through your medical records and report any errors.

Protect Yourself from Medical Identity Theft

Medical identity theft can be challenging to identify and frustrating to deal with. It can also have far-reaching consequences, both financial and medical. But there are steps you can take to protect your information and your medical data from thieves. A great first step is reading this article, because now you know that it can happen! Follow these next steps to reduce your chances of having your identity stolen and used to get medical care fraudulently.

Be Careful Where You Provide Your Information

Many different offices and organizations ask for personal or medical information. This could include your social security number, health insurance information, Medicare number, or health details. Whenever anyone asks, you should ask questions first. Why do they need it? Do they need it in the first place? You may find that they don’t. Some offices as for particular information because their form has a spot for it, not because they particularly need it.

If they do have a valid reason to have that information, ask more questions. How do they protect it? Will they share it? If they will, who will they share it with? If you aren’t happy with those answers, ask if there’s a way to proceed without that information. Depending on your situation, you may be able to find somewhere else that offers the same service that doesn’t require that information or has better answers for your questions.

In addition, to avoid scammers and social engineering, never give medical information to anyone who calls, emails, or texts you unexpectedly. Instead of continuing the conversation, call the organization directly from a phone number you know is genuine.

Don’t Share Medical Things on Social Media

You can never really be sure who sees what on social media, even if your privacy settings are top-notch. It’s just the nature of the sites. So you should never share medical information, such as news of an upcoming surgery or procedure, on social media. An enterprising thief can add that information to whatever else they have on you, and that makes it even easier to steal your identity.

Know What Thieves Can Use

Identity thieves can use information from a variety of places to commit medical identity theft. But they can get your information from more places than you might expect. All of your medical records, health insurance records, and all documents with any kind of medical information should be kept secure. That doesn’t just include your insurance cards. Thieves could get enough information from health insurance enrollment forms, prescriptions or prescription bottles, bills from medical providers, or statements from your health insurance company. Store all of these items somewhere secure.

Dispose Carefully

An ambitious or desperate would-be thief isn’t above snooping through your trash for information. Don’t just toss things containing medical data of any kind in the garbage. For documents, shred them before putting them in the trash. If you don’t have a shredder, see if your city or municipality has a shred day. And for things that are hard to shred, like pill bottles, peel off and destroy any identifying information if you can; if not, cover it up with a permanent marker.

Protect Your Mail

Thieves could also steal mail from your insurance company or healthcare providers out of your mailbox to get the data they need to commit their fraud. Consider turning on the Post Office’s Informed Delivery feature. That way you can see in advance if you’re getting anything from healthcare providers and insurance and get it from the mailbox as soon as possible (or know immediately that it’s missing). You could also switch to paperless communication. Documents that don’t go through your mailbox can’t be stolen from your mailbox.

Stay Alert for Signs of Medical Identity Theft

What makes medical identity theft so challenging is that it can be difficult to spot. People often aren’t even aware that their identity has been used in this way until they apply for a mortgage or a new credit card and are declined. They then find that their credit has been devastated by fraudulent medical bills sent to collections.

You can avoid this by staying alert. Review every medical bill that you get, whether in print or online. Confirm that you really got those services at that place on that day. Read your Explanation of Benefits from your insurance and make sure there’s nothing incorrect on there. Periodically get a copy of your medical records and make sure everything on it is accurate. And monitor your credit report, which will help you spot regular identity theft as well as the medical variety.

If anything unusual comes up in your monitoring, the next step is to take action. Contact the source of the inaccuracy. If it’s in your Explanation of Benefits, call your health insurance; if it’s on a bill or your medical record, call the provider. There is a chance that it’s just a mistake from the provider or your insurance. In that case, one or two calls should see it resolved. But if it’s a case of medical identity theft, catching it and dealing with it as early as possible can help reduce the effects it will have on your finances, your health, and your life.

About Your Host

Chris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, a tech-friendly website attracting a remarkable 6,000,000 visitors a month. In 2000, Chris created WhatIsMyIPAddress.com as a solution to finding his employer’s office IP address. Today, WhatIsMyIPAddress.com is among the top 3,000 websites in the U.S.

Share Post:

COULD YOU BE EASY PREY?

Take the Easy Prey
 Self-Assessment.

YOU MAY ALSO LIKE

If you’ve ever felt like your smart devices are “spying” on you and silently collecting your personal data to feed the almighty algorithm or…

Less than 30 years ago, biometric security seemed like something out of science fiction—reserved for futuristic thriller films like The Bourne Identity or Mission:…

Professionally and personally, most of us spend a lot of our time online. We use our smartphones and our personal computers for everything from…

PODCAST reviews

Excellent Podcast

Chris Parker has such a calm and soothing voice, which is a wonderful accompaniment for the kinds of serious topics that he covers. You want a soothing voice as you’re learning about all the ways the bad guys out there are desperately trying to take advantage of us, and how they do cleverly find new and more devious ways each day! It’s a weird world out there! Don’t let your guard down, this podcast will give you some explicit directions!

MTracey141

Required Listening

Somethings are required reading – this podcast should be required listening for anyone using anything connected in the current world.

Apple Podcasts User

Fascinating stuff!

I've listened to quite of few of these podcasts now. Some of the topics I wouldn't have given a second look, but the interviewees have always been very interesting and knowledgeable. Fascinating stuff!

Apple Podcasts User

Excellent Show

Excellent interview. Don't give personal information over the phone … it can be abused in countless ways

George Jenson

Interesting

I've listened to quite of few of these podcasts now. Some of the topics I wouldn't have given a second look, but the interviewees have always been very interesting and knowledgeable. Fascinating stuff!

User22

Content, content, content!

Chris provides amazing content that everyone needs to hear to better protect themselves and learn from other’s mistakes to stay safe!

CaigJ3189

New Favorite Podcast!

Entertaining, educational and I cannot 
get enough! I am excited for more phenomenal content to come and this is sthe only podcast I check frequently to see if a new episode has rolled out.

brandooj

Big BIG ups!

What Chris is doing with this podcast is something that isn’t just desirable, but needed – everyone using the internet should be listening to this! Our naivete is constantly being used against us when we’re online; the best way to combat this is by arming the masses with the information we need to stay wary and keep ourselves safe. Big, BIG ups to Chris for putting the work in for us.

Riley

As seen on

COULD YOU BE EASY PREY?

Take the Easy Prey Self-Assessment.
close

Copy and paste this code to display the image on your site

COULD YOU BE EASY PREY?

Take the Easy Prey Self-Assessment.

We will only send you awesome stuff!

Privacy Policy

Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. To make this notice easy to find, we make it available on every page of our site.

The Way We Use Information

We use email addresses to confirm registration upon the creation of a new account.

We use return email addresses to answer the email we receive. Such addresses are not used for any other purpose and are not shared with outside parties.

On occasion, we may send email to addresses of registered users to inform them about changes or new features added to our site.

We use non-identifying and aggregate information to better design our website and to share with advertisers. For example, we may tell an advertiser that X number of individuals visited a certain area on our website, or that Y number of men and Z number of women filled out our registration form, but we would not disclose anything that could be used to identify those individuals.

Finally, we never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above.

Our Commitment To Data Security

To prevent unauthorized access, maintain data accuracy, and ensure the correct use of information, we have put in place appropriate physical, electronic, and managerial procedures to safeguard and secure the information we collect online.

Affiliated sites, linked sites, and advertisements

CGP Holdings, Inc. expects its partners, advertisers, and third-party affiliates to respect the privacy of our users. However, third parties, including our partners, advertisers, affiliates and other content providers accessible through our site, may have their own privacy and data collection policies and practices. For example, during your visit to our site you may link to, or view as part of a frame on a CGP Holdings, Inc. page, certain content that is actually created or hosted by a third party. Also, through CGP Holdings, Inc. you may be introduced to, or be able to access, information, Web sites, advertisements, features, contests or sweepstakes offered by other parties. CGP Holdings, Inc. is not responsible for the actions or policies of such third parties. You should check the applicable privacy policies of those third parties when providing information on a feature or page operated by a third party.

While on our site, our advertisers, promotional partners or other third parties may use cookies or other technology to attempt to identify some of your preferences or retrieve information about you. For example, some of our advertising is served by third parties and may include cookies that enable the advertiser to determine whether you have seen a particular advertisement before. Through features available on our site, third parties may use cookies or other technology to gather information. CGP Holdings, Inc. does not control the use of this technology or the resulting information and is not responsible for any actions or policies of such third parties.

We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. For information about their specific privacy policies please contact the advertisers directly.

Please be careful and responsible whenever you are online. Should you choose to voluntarily disclose Personally Identifiable Information on our site, such as in message boards, chat areas or in advertising or notices you post, that information can be viewed publicly and can be collected and used by third parties without our knowledge and may result in unsolicited messages from other individuals or third parties. Such activities are beyond the control of CGP Holdings, Inc. and this policy.

Changes to this policy

CGP Holdings, Inc. reserves the right to change this policy at any time. Please check this page periodically for changes. Your continued use of our site following the posting of changes to these terms will mean you accept those changes. Information collected prior to the time any change is posted will be used according to the rules and laws that applied at the time the information was collected.