identity theft n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Identity Theft PowerPoint Presentation
Download Presentation
Identity Theft

Loading in 2 Seconds...

play fullscreen
1 / 11

Identity Theft - PowerPoint PPT Presentation


  • 557 Views
  • Uploaded on

Identity Theft. So, what you gonna do about it?. The Law. RCW 9.35.020: No person may knowingly obtain, possess, use, or transfer a means of identification or financial information of another person, living or dead, with the intent to commit, or to aid or abet, any crime. The Costs.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Identity Theft' - stacie


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
identity theft

Identity Theft

So, what you gonna do about it?

Robert S. Brown

UW Medical Center

the law
The Law
  • RCW 9.35.020: No person may knowingly obtain, possess, use, or transfer a means of identification or financial information of another person, living or dead, with the intent to commit, or to aid or abet, any crime.
the costs
The Costs
  • $53 Billion per year nationwide
  • Loss of good will = loss of business?
the methods
The Methods
  • Phishing has replaced dumpster diving
  • Other methods include:
    • Shoulder Surfing
    • Skimming (data device on an ATM)
    • Social Engineering (think Mission: Impossible)
    • Mail Theft (old fashioned but it works)
    • Retail Theft (stealing, hacking, conning, bribing)
    • Plus a zillion other ways your data gets stolen
two likely scenarios at uwmc
Two likely scenarios at UWMC

1. Care Recipient is an identity thief

2. Inside job (or hacker)

care recipient is an identity thief
Care Recipient is an identity thief
  • Duty to notify the victim
    • Do not share PHI unless permitted by law
      • RCW 70.02.050
      • HIPAA
    • Consider notifying law enforcement
    • Share handout explaining what you will do, what they can do (e.g. FTC’s excellent white paper)
    • http://www.consumer.gov/idtheft/
care recipient is an identity thief1
Care Recipient is an identity thief
  • Need to mitigate the damage
    • Amend medical records
    • Notify internal departments
    • Promptly investigate & notify the victim of your findings and actions taken to fix
employee is the identity thief
Employee is the Identity Thief
  • Investigation policy?
    • Who is on point?
    • Who should you alert?
    • How will you summarize at conclusion?
  • Sanction policy?
    • Does it explicitly address ID theft?
    • Will the penalties meet the Seattle Times test?
summary
Summary
  • Review the laws:
    • RCW 9.35
    • HIPAA
    • RCW 70.02.050
summary1
Summary
  • Be proactive in protecting data
  • Be diligent about investigating
  • Create policies now
uw medical center
UW Medical Center
  • Rob Brown, Assistant Director of Compliance206.598.4342 rsbrown@u.washington.edu
  • Ellen Rubin, RN, Privacy Officer206.598.5701 rubin@u.washington.edu