I have what? Medical Identity Theft

If you walked into your doctor's office and they put on masks to treat you, you might panic at their reaction.  You later find out they were taking preventative measures due to being diagnosed with TB.  You were diagnosed at a different office, when you visited as a 53 year old Hispanic male smoker who weighed 397 pounds.  You might begin to question why your doctor did not notice this discrepancy in your size, shape, age and ethnicity or wonder how this man's records became part of YOUR medical file. 

The Federal Trade Commission asks, "How would you know if your personal, health, or health insurance information has been compromised?"  Medical identity theft is the newest form of technology driven crime, with over 1.5 million people in the United States affected at a cost of $41.3 billion dollars last year, according to Bloomberg.  Medical identity theft occurs when someone uses your personal information, including your name, birthday, or social security number or uses your health insurance to make fraudulent claims. 

Medical Identity theft is hard to catch and even harder to repair with it taking almost 10 years and over $20,000 to get your identity back.  Physicians, medicare and health insurance companies are not yet equipped to scan for id theft and medical discrepancies when new patients are treated.  To correct your medical records, you will have to locate each unauthorized visit and then go in person to each doctors' office.  When visiting providers to get your data corrected, you will encounter staff who are concerned about HIPAA laws preventing them from modifying the records or providing you copies of the thief's medical data.    To make matters worse, thieves visit an average of 5 different medical offices and often suffer from chronic conditions, which make for a lifetime of tracking down unauthorized services.    

While some victims receive medical bills for unauthorized services or notice strange insurance billings, most often, this form of identity theft goes unnoticed for years.  If you don't receive a bill and it isn't affecting your credit, you might wonder how medical identity theft really affects you and why you should be concerned about this growing problem.  When someone receives medical care under your name and social security number, it gets passed from office to office electronically and stored in databases.  If the thief was treated for a disease, illegal drug use, allergy or other condition, this would be placed in your permanent medical record and you will have a hard time ever getting this information removed.  You run the risk of being diagnosed and treated for incorrect ailments based on your chart and medical history, and doctors may not believe that you never tested positive for a disease.  You must also worry about incorrect blood types, missing drug allergy information and being declared legally dead.  These medical records will affect your ability to get life insurance, health insurance, long and short term care insurance and even employment down the road.  This simple data error can cost you a great deal of time, money and frustration and leave you with very few options for remediation.

To help monitor your medical ID, watch for bills from medical offices that you have never visited, scan your insurance receipts to ensure that you received all of the treatments listed, order a copy of your credit report every six months to scan for any erroneous accounts and review your medical records annually.    When visiting your doctors office verify important personal data including your birthdate, address, phone number, blood type, current medications and allergies, to ensure this information is kept up to date and correct.  Keep your health insurance card safe and destroy it when you receive a new one.  Report any possible thefts to the police, doctors offices and your health insurance immediately.  Health insurers are beginning to create policies that help protect patients and prevent fraudulent charges by allowing the patient to setup a special password which must be submitted with all pre-claims and claims.  If a thief does not have this password they will not be pre-approved for care or admitted to the hospital, helping to limit some of the damage they were previously able to cause.

Lindsay


References

Dolan, Pamela Lewis.  (2012).  Medical ID Theft:  Double Danger for Doctors.  Amed News.  Retrieved from http://www.ama-assn.org/amednews/2012/08/06/bisa0806.htm.

Federal Trade Commission.  (2010).  Medical Identity Theft.  FTC.  Retrieved from http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt10.shtm.

Privacy Rights Clearinghouse.  (2010).  Identity Theft:  What to Do if It Happens to You.  Retrieved from https://www.privacyrights.org/fs/fs17a.htm#18.

Robertson, Jordan.  (2012).  How Medical Identity Theft Can Leave You a Decade of Headaches.  Retrieved from http://go.bloomberg.com/tech-blog/2012-11-08-how-medical-identity-theft-can-give-you-a-decade-of-headaches/.

World Privacy Forum.  (2007).  Medical Identity Theft. Retrieved from http://www.worldprivacyforum.org/medicalidentitytheft.html.

Rethinking Online Course Learning


Rethinking Online Course Learning
Are you a student like myself taking an online course? Are you just like me and having to take all online courses to get your degree? I know for myself this was not my favorite option, but with having a family that I need to support comes a job/career. Unfortunately there are many jobs out there (like mine) that require rotating shifts, which makes it very difficult (if not impossible) to attend classes in person. 

There are other concepts that schools can and should use when adopting online course program. Schools need to remember that there are a lot of students with different backgrounds and different needs; however most people learn much better through different learning styles, and they will be more inclined to remember what they learned by stimulating other senses than just sight from reading.

When we think of learning styles we often think of visual and auditory, but there are others as well that affect our learning ability. These other styles are kinesthetic/physical and social or solitary. Typical online courses engage the visual (mostly reading) and some auditory (reading can be linked to this style) but the only kinesthetic or physical aspect is the typing or page flipping. I think that is normal for in person classes as well. Online courses are a solitary form of learning because we don’t interact with the other students. Sure many online programs have discussion threads, but that is not the same as having an in depth conversation in a class. For the most part our visual sense is the only sense being truly stimulated, which can make it difficult to regurgitate information that we learned later on.

When going to class in person we are engaged in the class’s sights, sounds, and we are in a social environment. Many of our senses are stimulated such as sight, sound, and even the smell of the classroom (or class mates). There are still required readings when taking class in person, but this is ok because we are receiving other information through other learning styles. Our memories will be able to retain this information more easily because it has been stimulated in more than one way.

Harvard Extension (Harvard University’s online program) utilizes the internet, to not just their advantage, but their students advantage as well. They realized that students –taking online courses- are not going to remember the large amount of information that college courses disseminate through just reading. Instead they have their instructors post their lecture (that was giving to a class in person), and their materials such as, the power point presentation and any video they may have shown. This may not be the exact answer to the problem of learning online, but I think this is a great step forward in the right direction to ensure the quality of education can be as equal as possible for all students.

Jesse




Work from home?


Work from home: Should you let your employee’s work remotely?

They want to work from home, why not let them.

Working from home is an option that has becoming more popular with employers as the information age has come into play.  Allowing your employee’s the ability to work from home is a trending method of reducing costs and increasing employee reward. The decision to let your employees work from home however needs to be balanced with organizational demands. There are many factors that go into play when making this decision including: facilities savings, professional isolation, employee turnover, job performance, employee satisfaction, and organizational flexibility. After analyzing these factors, a decision will need to be made and company policy formulated. Many possible decisions could come from this analysis including allowing only partial work from home or having the employees work from home full time. A review of new research into the effects of remote work and its impact on job performance, job satisfaction, and employee turnover.

Employee Turnover/Job Satisfaction

Allowing employees’ to work from home gives them the ability to better balance work/home life demands. According to the article Why Some Firms Adopt Telecommuniting While Others Do Not: A contingency Perspective by Mayo, Pastor, Gomez-Mejia and Cruz “Telecommuting offers much greater employee autonomy than other types of family-friendly plans such as flexible work hours, parental leave, and on-site child care facilities” (Mayo, Pastor, Gomez-Mejia, & Cruz, 2009). These benefits including the ability to work from home grant employees much more control over their daily lives and give them the ability to take care of the needed of their family while still being productive in the work environment. Having these options available greatly increase employee satisfaction and offer a significant benefit over traditional benefits offered by employers. (American Psychological Association, 2007) These benefits must be weighed against the potential negatives that these benefits induce.

Professional Isolation/Job Performance

Working from home has a significant impact on an employee in particular employees are more likely to feel isolated from their coworkers and their supervisor and as a result feel that they are working inside a bubble and their good work will go unnoticed. Golden, Veiga, and Dino have suggested that there are ways to mitigate but not completely reduce these effects. In particular they have concluded that greater the “access to communication-enhancing technology,” the more significant reduction in these negative feelings the employees have (Golden, Veiga, & Dino, 2008). In their research they have concluded that job performance for individuals that spend limited time teleworking compared to full time work from home that job performance increases but will significantly drop off if they work from home full time. Their research also has a surprise indicating that “the impact of professional isolation on turnover intentions, we found that teleworkers who experienced greater professional isolation expressed less of a desire to leave the organization, which was contrary to expectations” (Golden, Veiga, & Dino, 2008).

After reviewing the information available a decision should be made on whether or not to let your employees work remotely. Many factors come to play in this decision and they will be specific to the corporation. However we can conclude that allowing employees the ability to work remotely up to two times a week will not harm their productivity and give them some much needed flexibility and improve job satisfaction. Whichever way you choose to guide your corporation will now be an informed decision on the effect and result of remote workers.

-Andy

References

American Psychological Association. (2007, November 20). Telecommuting Has Mostly Positive Consequences For Employees And Employers. Retrieved from ScienceDaily: http://www.sciencedaily.com/releases/2007/11/071119182930.htm
Golden, T. D., Veiga, J. F., & Dino, R. N. (2008). The Impact of Professional Isolation on Teleworker Job Performance and Turnover Intentions: Does Time Spent Teleworking, Interacting Face-to-Face, or Having Access to Communication-Enhancing Technology Matter? Journal of Applied Psychology, 1412-1421.
Mayo, M., Pastor, J.-C., Gomez-Mejia, L., & Cruz, C. (2009). WHY SOME FIRMS ADOPT. Human Resource Management, 918-939.



Home Networks Not as Secure as You Think

The culprit: WEP

 
     Would you sleep in a room on the second story of a building with the window closed but unlatched and a ladder leaning against the window?  If you use Wired Equivalent Privacy, also known as WEP, for your home wireless internet security, then that is what you are doing electronically, and WEP is often the default setting on wireless network routers that you buy for your home.  In an article written by Steve Janss, he highlighted an important wireless security issue when he wrote, “Wired Equivalent Privacy vulnerabilities came to light … in October 2000” (Janss, 2001).  WEP is a common wireless network security protocol that is still in use today.  Janss goes on to say that computer programmers began writing software in 2001 that could easily and quickly decipher the code and find the password for any security system using the WEP protocol.  Although the use of WEP in handheld devices and home computer systems puts your personal information at risk, there is a solution to the problem.

     Since 2001, programmers have improved their programs to break into these networks.  Without going into the math and technical details, the problem is that WEP uses a limited size of its encryption key and many of the messages sent over a wireless network start with the same few characters.  Using these two details, a hacker can write a program to eliminate most of the possible encryption keys, leaving only a few to test and with only about 10,000 packets of data that takes only a few minutes to send, the program can find the password key.  Anyone who has that password key can access your network and see everything that you send and receive on the internet.  Today, there are even videos on YouTube that demonstrate step-by-step instructions on how to break into systems protected with WEP security and anyone with even a moderate level of computer skills can follow the instructions and break into a network.  This is still a current issue as you can often find some networks protected with WEP that you can see with your laptop from home or many public locations.  Fortunately, most current home wireless systems include a new style of security.

The solution: WPA2


     There is hope for home wireless networks and the people who own them.  Manufacturers began releasing a new style of security protocol in 2003, with an upgrade in 2004.  The latest version called, “WiFi Protected Access 2” or WPA2 is the most secure system available for home use.  WPA2 is a new security standard developed by the WiFi Alliance that supersedes WPA and provides much better protection for home security systems.  Determined hackers can still crack this security code, but it takes longer and requires more knowledge than cracking WEP.  There are, however, some important cautions, even with WPA2.

WPS: As Guilty as WEP


     Many new wireless devices come equipped with something called WiFi Protected Setup, or WPS.  This is supposed to make setting up your wireless system much easier, and it does, but it bypasses the WPA2 security and uses a simple 5-digit pin code.  Hackers can quickly decipher the pin code by just trying all the different combinations of numbers and within a few minutes, gain access to your system.  WPS negates all of the benefits of WPA2 security, so you should never use it.  However, WPS is not the only risk and password length plays an important role in your wireless security.

Don’t Scrimp on Password Length


     When setting up the WPA2 security on a wireless network, the system will ask you to enter a password with between 8 and 63 characters.  The length of password that you choose will determine the level of security in the system.  Choose a password of between 60 and 64 characters to take advantage of the full security of WPA2.  If you select a password with fewer characters, the security of your system is only slightly better than with WEP security.  Do not worry about having to remember this password because you will only need it to add new devices to your wireless system, and once entered in a device, that device will remember it.  Make sure that you choose a series of words, numbers and symbols and do not select a repeating series of characters.  The best passwords will not have any characters that are identical next to each other. 
 

Replace Old Devices for Piece of Mind


     One final note is that if you have an older device that does not have WPA2 capability, you cannot upgrade it.  The only solution is to throw out the old device and buy a new one, but for less than $100, you can provide security for all of your personal information.  Even if your device is not a wireless router, you will have to set up that router to allow WEP for that one device, and your system is only as secure as your weakest link.  With WPA2 and a long password, you can rest easy knowing that your network is secure from all except the most determined hackers.


Rob.

References

Goth, G. (2002). Read it and WEP. IEEE Internet Computing, 6.  Retrieved from http://csdl.computer.org.dml.regis.edu/dl/mags/ic/2002/01/w1006.pdf
Janss S. (2001, December 17). WEP's fatal flaw exposed. Network World, 45. Retrieved from http://go.galegroup.com.dml.regis.edu/ps/i.do?id=GALE%7CA80860761&v=2.1&u=regis&it=r&p=CDB&sw=w

Learning Online and Loving It


             Just yesterday, I took my girlfriend out to dinner at Red Lobster before coming home to submit my math homework online.  Earlier today I took a break from playing with my kids to go and email the final portion of my marketing course project.  Yes, I'm one of the growing numbers of college students that are taking online classes, and I love it.

            A little over ten years ago, before the girlfriend and the kids, I was a high school grad ready to begin my first semester on campus.  Back then, I wanted to become a computer engineer pretty badly, and Rutgers gave me a pretty nice sized scholarship to pursue that goal.  I remember the daily routine of waking up at 7am, going to sit through a few 2 hour lecture sessions, participating in lab assignments, studying at the library, and all of the college student norms.  I also remember falling asleep in those lecture classes, not because I was up all night partying, but because I was just bored.  Sitting in a big room with 200 people; watching one guy talk about "stuff" often led to closed eyes and head nods for me.  After doing that for three years, I lost much of my interest in the program and dropped out.

            Living life after college led me to finding a great woman, buying a house, and having two children.  In 2011, a random thought popped into my head, "I should go back to school!"  I found Regis University's Business Tech program, learned many of my credits would transfer over from my 2001-04 college stint, and enrolled.  Regis is in Colorado, I'm in Jersey, I'm taking classes at Regis, but I'm still in Jersey... Perfect!

            A publication by Mehran Bozorgmanesh from the Islamic Azad University in Iran speaks of the many benefits associated with distance learning.  In his article "Online Classes and Traditional Classes in Adult Education", Bozorgmanesh lists time and geographic flexibility as the top two advantages of taking online classes.  Discussing geographic flexibility, Mehran notes that "It no longer matters where you live."  He later continues stating that students of online classes can "escape the monotonous lectures and long classroom hours yet be well acquainted with the study materials." 

            For me, Mehran's points are the exact reasons why I'm enjoying this tenure in college more.  There are no more lectures about "stuff", yet I'm still able to learn the same material while on my own schedule.  Taking online courses gives me the smaller classroom size that I enjoyed through grammar school.  There is greater interaction with other students and faculty, mainly due to the weekly discussion board assignments.  I feel that I'm learning a lot more by reading the opinions of others than I was from listening to the robotic professors speaking out loud to a hundred people.  I can still go to work, take care of my home, and be with my family, all while getting a degree.  I have freedom in how I learn that I didn't have before.  According to the 2010 Sloan Consortium Report online enrollment in post-secondary institutions grew 21% between 2009 and 2010.   If you haven't already, I recommend any of you reading this to try taking a class online.  If you're like me, you are going to really enjoy it.

Doug

References
Sloan Consortium, (2010), Class Differences: Online Education in the United States, 2010 Retrieved from http://sloanconsortium.org/publications/survey/class_differences
Bozorgmanesh, M. (2011), Online Classes and Traditional Classes in Adult Education, Nature and Science 2011, 9(8), pp: 81-84, Retrieved from http://www.sciencepub.net/nature/ns0908/17_6409ns0908_81_84.pdf

A boy invited a fifteen year old girl named, Phoebe Prince, to a dance. This dance was the height of a social season at high school in Massachusetts. A few days before the dance, the police received a call from a sister of Phoebe and the police immediately headed to the Phoebe’s residence. When the police arrived, they found Phoebe had hung herself. One of Phoebe’s fellow students was jealous of her date and began to harass Phoebe via texts and Facebook messages (Kotz, 2010). Today’s children have to worry about a whole new type of bullying, something they need to worry about even at home around their loved ones. This new abuse is cyberbullying.

According to stopbullying.gov cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Children today are extremely efficient with today’s technology; they are constantly texting each other and it can be challenging to separate them from their Facebook pages.  Cyberullying is something that happens to many of our children and it can happen 24 hours a day and seven days a week.

Cyberbullies do not have a face. Much of cyberbullying is done anonymously and can be shared with a very wide audience. This allows cyberbullies to say what they want without much worry of being caught. Most children who are cyberbullied do not go home and tell their parents and hope the issue will go away on its own. Children are worried if they inform a parent or teacher the bullying will worsen.  Unless parents and teachers are educated on the seriousness of cyberbullying, it can be difficult to stop.  It is imperative parents, teachers, and those who spend quality time with children understand cyberbullying is real and affect children differently.  Cyberbullying is difficult to stop but below are a few tips from connectsafely.org to prevent cyberbullying.

·         Do not respond- Bullies want a reaction, if you react you are empowering the bully
·         Do not retaliate- Getting back will reinforce the bully’s behavior
·         Save all evidence- Messages can be captured and saved.
·         Talk to a trusted adult- Children cannot do it by themselves, if too scared to talk to an adult contact the school anonymously
·         Do not be a bystander- Watching or forwarding a message also empowers the bully. Try to stop the bullying, if you cannot, report the behavior

 Social media should be fun and way to stay in contact with family and friends, not somewhere children should be scared to participate. We need to remember cyberbullying affects everyone! We all must stand and stop cyberbullying!

Tim

What is the price of being connected?




By:  Ann Wolff, COM215

It used to be a lengthy process when requesting your own medical records.  A patient would need to complete a written form, and possibly pay a processing fee.  The record would need to be manually copied by staff.  This entire process could take up to six weeks at times.   Let’s look at how the internet has affected access to medical records for both the patients and their health care providers.

Patient advocacy and the development of the internet has expanded our access to medical records as well as made it faster.  Today a patient can log in to their record, review lab work, schedule appointments, renew prescriptions, print needed documentation, and interact electronically with their provider.  This is becoming commonplace in today’s world. 

But what about some of the newest ways to electronically interact?  Many providers are developing video interactions (Johnson, 2009).  For example if my child develops a rash, or oozing from the eye; rather than take them straight to the doctor’s office I can video chat with advice staff and they can prescribe medication online as needed.  Another unique feature is being able to keep my basic medical record data on a flash drive, this is provided by many insurance/healthcare providers.  That way when I travel far and wide, medical professionals can provide comprehensive care by accessing my flash drive.  Smart phone apps are being developed to allow a person to make appointments, renew medications, and view data on the go.  As I am hiking up the steps of the Eiffel tower and become short of breath, I may stop to take a break, during that short break I could schedule a physical with my doctor to take place when I get back home.

A parent can have access to their child’s medical records up to a certain age.  An adult daughter/sibling who is an authorized representative can have access to their elderly parent’s medical records as well ("Your medical records", n.d.).   The elderly can now use applications that show them the medications they are supposed to take, and the time, also with pictures of the pill to help them keep it straight.

What are some of the limitations to access?  You may not always be able to see notes written by the provider in a chart, particularly a mental health provider ("Your medical records", n.d.).  When it comes to children a parent usually has full access in California until the age of 12.  After that a parent may have limited access to lab results, prescriptions, and certain medical office visits ("Stay on top of their health; new online features for parents", n.d.)

Interaction with our healthcare is changing on a rapid basis, as technology develops, and our human brains have “lightbulb” moments about how to use the new technology; at this point the sky is the limit.  Next month’s blog article on electronic health records will discuss steps the industry is taking to maintain a patient’s privacy.

References