Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

DHSC’s Counter-fraud Strategy to Combat Healthcare Fraud

DHSC

Healthcare remains one of the most lucrative industries for criminals with nearly $272 billion lost in medical identity theft each year. The numbers are staggering with the presence of laws like HIPAA – Health Information Portability and Accountability Act – that have a maximum of $50,000 per violation. Although regulatory authorities have enforced stringent obligations on health service providers to protect medical records of patients, there remain certain loopholes with the increased adoption of technology. 

In this regard, the Department of Health and Social Care (DHSC) of the UK has introduced its counter-fraud strategy to combat emerging healthcare hassle and provider better patient care. This blog highlights the current-day context of healthcare fraud and discusses DHSC’s anti-fraud framework to counter such instances. 

Healthcare Fraud Schemes 2021

While COVID-19 created social, global and economic challenges like disrupted economy and unequal vaccine distribution, it opened new doors for bad actors as well. With time, the world grew smarter by developing countermeasures for the pandemic, but fraudsters out there who are banking on digitization are still getting the better of the healthcare industry. Some of these fraudulent incidents happened in 2021 are stated below.

$109 Million – Durable Medical Equipments

In May 2021, two defendants, Jessica Jones and Elizabeth Putulin pleaded guilty to Medicare fraud in the US district court. In a partnership with Juan Camilo Perz, they bagged a hefty $109 million by filing false insurance claims for durable medical equipment (DME). Perz conspired with both women to receive kickbacks through the US Medicare program, accounting for a HIPAA violation. 

$100 Million – Home Care Services Fraud

February this year, two fraudsters in Massachusetts were allegedly involved in receiving illegitimate kickbacks through a business providing home care services. Turns out both were part of a healthcare fraud scheme since one being the co-owner was operating a shell company. On the other hand, the second culprit was a nurse who was seemingly employed there. By defrauding Medicare and MassHealth and getting referrals through kickback payments, they made $100 million in black money. 

$5.4 Million – Plot for Mental Health Services

In March, a multi-million healthcare fraud takedown occurred comprising thirteen people charged with medical identity theft. The district court disclosed information about the guilty in two separate indictments unveiling links with mental health service providers. In a statement, the authorities mentioned that the criminals made medical health practitioners submit falsely-generated claims through their employers, resulting in $5.4 million in total.  

Counter-fraud Framework by the DHSC

The findings by the NHS Counter Fraud Authority (NHSCFA) shows that an estimated £1.21 billion are lost as a result of financial crime originating from stolen medical records, digital fraud, bribery and embezzlement. Healthcare fraud is not limited to medical transactions but also extends to national health initiatives provided by the NHS accounting for numerous false insurance claims. 

The Department of Health and Social Care (DHSC) of the UK in March 2021 proposed a strategy to identify and tackle the increasing medical theft cases. The counter-fraud framework aims at reducing fraudulent activities in the National Health System (NHS) so that funds intended for patient care, health care facilities, medical personnel and equipment does not end up in the wrong hands. 

DHSC’s Principles to Combat Fraud

NHS in its counter-fraud strategy suggests 5 key principles to ensure healthcare fraud is effectively dealt with, which are stated below:

  • Healthcare authorities should make sure they have a centrally managed system that is based on clear accountability guidelines. In this regard, NHS bodies, the counter fraud board and the Director general Finance at NHS all are accountable for the actions. 
  • A collaborative approach must be developed for information sharing between organisations. To make sure proper implementation of these standards, senior management must identify the possible risks, and create a functional mechanism to streamline processes.
  • Acknowledge that combating financial fraud is equally the responsibility of all staff members regardless of their role in the organisation. Consistent guidance and a proper assurance framework are also important to combat healthcare fraud. Personnel must have a clear understanding of reporting requirements and counter-fraud measures. 
  • Consider previous use cases for developing in-house fraud prevention strategies that will help in identifying various types of frauds such as prescription fraud, medical identity theft, false health insurance claims etc.  
  • Recognising different types of financial crime conducted through healthcare institutions, health service programmes, and other third-party intermediaries, and developing strategies to counter them. 

KYP – A Viable Approach to Address Healthcare Hassles

Know Your Patient (KYP) is a service through which hospitals, health insurance providers, and public health facilities can make sure patients are legitimate and trustworthy. This solution powered by artificial intelligence models takes into account government-issued user ID documents to perform a foolproof verification using document and face verification checks. 

Healthcare service providers can incorporate a state-of-the-art KYP solution that can help them develop fraud prevention programs. These measures enable health providers to stay compliant with guidelines outlined by the DHSC in their counter-fraud framework, keep fraudsters at bay and avoid medical identity theft at scale. 

Want to get more information on how to protect your patient’s identity? 

Related Posts

Blog, Identity & KYC

Digital ID Verification

  The Current Situation Digital ID Verification is the key to securing your business in thes...

Digital ID Verification Explore More

Blog

e-IDV: Safeguarding Businesses and Customers in the Digital Age

Identity theft cases are on the rise in this age of digitisation. In 2022, India topped the list ...

e-IDV: Safeguarding Businesses and Customers in the Digital Age Explore More

Blog

The Most Common Use Cases of Identity Document Verification

As data breaches and other crimes increase, regulators must impose strict rules that corporations...

The Most Common Use Cases of Identity Document Verification Explore More

Blog, Financial Crime / AML

FSA demands greater AML Compliance from Japanese Crypto Exchanges

In a recent move, Financial Services Agency (FSA), the Japanese Financial regulator, has demanded...

FSA demands greater AML Compliance from Japanese Crypto Exchanges Explore More

Blog

Risk Assessment – Building Trust in Financial Institutions

For financial institutions to hold onto their customers, they must build and conserve advanced le...

Risk Assessment – Building Trust in Financial Institutions Explore More

Blog

Talent Acquisition Fraud – Hiring Legitimate Candidates with Identity Verification

Along with the rise in virtual and remote work, the number of cases of recruitment fraud is incre...

Talent Acquisition Fraud – Hiring Legitimate Candidates with Identity Verification Explore More

Blog, Fraud Prevention

ID Verification Trends to Curb Online Frauds

Automated Identity Verification Can Play a Significant Role in Fraud Management Fraud management ...

ID Verification Trends to Curb Online Frauds Explore More

Anti Money Laundering, Blog, Financial Crime / AML

Why PEPs are High Risk and a Threat To Your Business?

In the Financial and Trade industry, you may have often heard the term PEPs and the importance of...

Why PEPs are High Risk and a Threat To Your Business? Explore More

Blog, Identity & KYC

Know Your Customer with Video Proof

Know your Customer (KYC) verification with Shufti, which is becoming a recognised name in the...

Know Your Customer with Video Proof Explore More

Blog

Risk Assessment: Building Trust in Crypto Exchanges

Other than following AML and KYC laws, crypto exchanges have a huge responsibility on their shoul...

Risk Assessment: Building Trust in Crypto Exchanges Explore More

Blog

OCR Vs. ICR: The Key Differences that Businesses Need to Know

Financial institutions need to have reliable and efficient data management. With such a system, t...

OCR Vs. ICR: The Key Differences that Businesses Need to Know Explore More

Blog, Business Technology

4 Fintech trends to look forward in 2019

FInTech has come a long way from being a mere futuristic technology and has achieved scalability ...

4 Fintech trends to look forward in 2019 Explore More

Blog

Address Verification: The Cornerstone of Elevating Customer Experience

Today’s highly emerging technology is changing the way consumers shop online products. Given the ...

Address Verification: The Cornerstone of Elevating Customer Experience Explore More

Blog

Avoiding Billion-dollar Fraud & Non-Compliance Costs With Shufti

Businesses deplete millions of dollars each year on outdated technologies, employee training, and...

Avoiding Billion-dollar Fraud & Non-Compliance Costs With Shufti Explore More

Blog

Curbing Real Estate Crimes with AML Screening Solutions – How Shufti Can Help

In course of history, money laundering has always remained most complicated issue for governments...

Curbing Real Estate Crimes with AML Screening Solutions – How Shufti Can Help Explore More

Blog, Identity & KYC

How AML/KYC Direct Credible ICO Growth?

What if I told you, early in the days of ICOs, startups operated with little to no top level regu...

How AML/KYC Direct Credible ICO Growth? Explore More

Blog

AML Screening – Why Real Estate is an Easy Target for Money Launderers

The strong link between money laundering and the real estate industry is becoming a global concer...

AML Screening – Why Real Estate is an Easy Target for Money Launderers Explore More

Blog, Financial Crime / AML, Fraud Prevention, Identity & KYC

Data Breaches – Types, Sources, and Preventive Measures

A large number of well-renowned companies are under the threat of high-scale data breaches. After...

Data Breaches – Types, Sources, and Preventive Measures Explore More

Biometric Technology, Blog, Business Technology

Speed Up customer Onboarding with Online Facial Recognition

Banks are spending loads to digitize their operations. The competition is mounting, plus, people ...

Speed Up customer Onboarding with Online Facial Recognition Explore More

Blog

Age Verification Solution – Restricting Minors from Becoming Mules

From playing online video games to betting on horses, the digital gaming and gambling industry is...

Age Verification Solution – Restricting Minors from Becoming Mules Explore More

Blog, Financial Crime / AML, Identity & KYC, Reg Tech

Significance of AML Compliance in Money Services Business

The financial sector landscape is evolving with the advent of the FinTech industry. Many revoluti...

Significance of AML Compliance in Money Services Business Explore More

Blog

Reshaping the Travel Industry with NFC Verification – How Shufti Can Help

With emerging technologies and the increasing use of digital services, the travel industry has be...

Reshaping the Travel Industry with NFC Verification – How Shufti Can Help Explore More

Blog, Business Technology, Financial Crime / AML, Identity & KYC, Online Marketplace

Know Your Business: The Next Step in Identity Verification

The complex regulatory environment and increased exposure to illegal activities indicate that bus...

Know Your Business: The Next Step in Identity Verification Explore More

Blog, Financial Crime / AML

What is PEP Compliance and Why do Financial Institutions Need it?

For Politically Exposed Persons (PEPs), an inter-governmental body established in 1989, Financial...

What is PEP Compliance and Why do Financial Institutions Need it? Explore More

Blog

Shufti’s Address Verification Service – A Key Step in Digital Identity Verification

The rapidly developing technology of today is altering how consumers browse for things online. Th...

Shufti’s Address Verification Service – A Key Step in Digital Identity Verification Explore More

Blog

Identification, Verification and Authentication – Cut from the same cloth

The modern era of technology has brought so many frauds to light. The digitized world has urged b...

Identification, Verification and Authentication – Cut from the same cloth Explore More

Blog

Secure the Fintech Future with RegTech

Financial Technology (Fintech) refers to the use of technological advancements in the financial i...

Secure the Fintech Future with RegTech Explore More

Blog

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help

Metaverse is a virtual space where people belonging to the same or different physical regions can...

Prevailing Crimes in Metaverse – How Shufti’s IDV Solution Can Help Explore More

Blog

Indonesia’s First-ever Comprehensive Law on Data Privacy – the PDP Bill

Being the largest economy in Southeast Asia, Indonesia is experiencing enormous growth in the dig...

Indonesia’s First-ever Comprehensive Law on Data Privacy – the PDP Bill Explore More

Blog

KYC Compliance for DeFi Platforms – Finding the Balance for a Secure Future

The rise of decentralized services in the form of digital asset trading platforms and DeFi consta...

KYC Compliance for DeFi Platforms – Finding the Balance for a Secure Future Explore More

Blog

KYC Verification – Fraud Prevention in FinTech & the Payments Industry

The growth of the online payment industry and FinTech companies comes with a simultaneous increas...

KYC Verification – Fraud Prevention in FinTech & the Payments Industry Explore More

Blog

Biometric Authentication Technology – Everything you Need to Know

Nowadays businesses are looking for more secure systems for the sole reason of customer authentic...

Biometric Authentication Technology – Everything you Need to Know Explore More

Blog

Top 5 Frequently Asked Questions about Biometric Verification

Identity theft, data breaches, and other crimes are rising in this age of digitisation. A quick r...

Top 5 Frequently Asked Questions about Biometric Verification Explore More

Blog

Identity Proofing – 7 Reasons Why Businesses Need it Now!

Modern-day cyberspace has effortlessly diminished the boundary between the real-life and digital ...

Identity Proofing – 7 Reasons Why Businesses Need it Now! Explore More

Blog

China’s Data Protection and Privacy Laws | 2023 Update

China has witnessed massive growth in the last few decades. However, the rise of the digital econ...

China’s Data Protection and Privacy Laws | 2023 Update Explore More

Blog

KYC Verification – Defeating Anonymity on Social Media Platforms

In the introductory phase, social media platforms were merely a small part of the internet where ...

KYC Verification – Defeating Anonymity on Social Media Platforms Explore More

Blog

Why Payment Processors Need Mobile ID Verification?

One of the many by-products of progressing technology is payment systems that have cropped up ove...

Why Payment Processors Need Mobile ID Verification? Explore More

Blog

The Role of KYC Protocols in Safeguarding the Future of Cryptocurrency

Despite volatility in the crypto sector, millions of individuals access their services worldwide....

The Role of KYC Protocols in Safeguarding the Future of Cryptocurrency Explore More

Blog

E-Signature | Digitise and Verify Agreements in Compliance

The use of electronic signature, or e-signature, has transformed business dealings. The days of s...

E-Signature | Digitise and Verify Agreements in Compliance Explore More

Blog

5 Ways AI Takes Document Verification to the Next Level

Data digitisation has made it accessible not only to legitimate users but also to cyber criminals...

5 Ways AI Takes Document Verification to the Next Level Explore More

Blog

Securing Digital Payments and Mitigating Financial Crimes Through AML Screening Solutions

The promise of payments technologies is being realized. Consumers are executing frictionless paym...

Securing Digital Payments and Mitigating Financial Crimes Through AML Screening Solutions Explore More

Blog, Business Technology

The demand for OCR Technology increasing for ID Verification

ID verification is core to overall identity verification services that help business around the g...

The demand for OCR Technology increasing for ID Verification Explore More

Blog

Bitcoin ATMs – how it works and KYC compliance

Bitcoin ATMs are everything an ATM is and isn’t. The world of finance and banking has chang...

Bitcoin ATMs – how it works and KYC compliance Explore More

Blog

How machine learning changed facial recognition technology?

We are entering a new era of fast and secure authentication clubbed with a perfect storm of digit...

How machine learning changed facial recognition technology? Explore More

Blog

What to expect from Booming Identity Verification Market in 2020?

Technologies hatched by fourth industrial revolution such as the Internet of Things (IoT), roboti...

What to expect from Booming Identity Verification Market in 2020? Explore More

Blog

KYC/AML Compliance – A Roadblock for Money Mules and Illicit Fund Transfers

Cybercrimes are becoming increasingly complex and diverse in the era of digitization, with frauds...

KYC/AML Compliance – A Roadblock for Money Mules and Illicit Fund Transfers Explore More

Blog

The Crucial Role of Face Liveness Check in Fintech

Fintech firms lose approximately $51 million to scams annually. However, the cost of fintech frau...

The Crucial Role of Face Liveness Check in Fintech Explore More

Blog

Understanding the Difference Between Money Laundering and Embezzlement

Money laundering and embezzlement are two financial offences involving the movement of significan...

Understanding the Difference Between Money Laundering and Embezzlement Explore More

Blog

Modern Financial Management: The Role of KYI in Safeguarding Businesses

With our digital ecosystem being full of threats, there is a significant possibility that the qua...

Modern Financial Management: The Role of KYI in Safeguarding Businesses Explore More

Blog

Facial Recognition Technology Pioneered at Olympic and Paralympic Games Tokyo 2020

Facial recognition has grown by leaps and bounds with the arrival of the sophisticated pattern-ma...

Facial Recognition Technology Pioneered at Olympic and Paralympic Games Tokyo 2020 Explore More

Blog

Top 5 Cryptocurrency Trends to Look Out for in 2023

2022 has been one of the most turbulent years for the cryptocurrency sector. For starters, Bitcoi...

Top 5 Cryptocurrency Trends to Look Out for in 2023 Explore More

Blog

COVID-19 and Travel & Tourism Industry – What Opportunities Await Post-Pandemic?

The world is completely exhausted with the COVID-19 pandemic. The corporate sector has lost enoug...

COVID-19 and Travel & Tourism Industry – What Opportunities Await Post-Pandemic? Explore More

Blog

How Businesses Can Leverage Optical Character Recognition Technology in 2023

Optical Character Recognition (OCR) has revolutionised how businesses gather, process, and analys...

How Businesses Can Leverage Optical Character Recognition Technology in 2023 Explore More

Blog, Online Marketplace

KYC Services and AML Compliance Services for Forex Industry

Forex Industry stands to benefit a lot by incorporating KYC services in addition to AML Complianc...

KYC Services and AML Compliance Services for Forex Industry Explore More

Blog

Hazards of Ransomware are real for Cryptocurrency Miners

Cryptocurrency may well be the future of economic landscape and it has the potential of taking th...

Hazards of Ransomware are real for Cryptocurrency Miners Explore More

Blog

Optical Character Recognition (OCR) – Powering Shufti’s Document Verification

Trust is a key factor when it comes to doing business or getting financial services from banks. A...

Optical Character Recognition (OCR) – Powering Shufti’s Document Verification Explore More

Blog, Financial Crime / AML, Reg Tech

AML Checks: An Emerging Frontier in RegTech Revolution

The Anti Money Laundering (AML) landscape has been around since the signing of BSA (Bank Secrecy ...

AML Checks: An Emerging Frontier in RegTech Revolution Explore More

Blog, Online Marketplace

What is Open Banking & Why Does it Matter in 2019?

Open banking is surely one of those trends that have the potential to change the banking and fina...

What is Open Banking & Why Does it Matter in 2019? Explore More

Blog

AI-Powered OCR to replace data entry in 2020 – A detailed insight

Living in the data-driven world, there is a huge demand for storing data from printed or handwrit...

AI-Powered OCR to replace data entry in 2020 – A detailed insight Explore More

Blog

Designing a Risk-free Customer Onboarding Flow for the Freelancing Industry

Freelancing websites saw an increased demand during the pandemic, and the trends continued to ris...

Designing a Risk-free Customer Onboarding Flow for the Freelancing Industry Explore More

Blog

Risk Assessment – Building Trust in Financial Institutions

For financial institutions to hold onto their customers, they must build and conserve advanced le...

Risk Assessment – Building Trust in Financial Institutions Explore More

Blog

AUSTRAC’s ML/TF Risk Assessment Report on Foreign Bank Branches [Part 3]

This blog makes the third chapter of our four-part series on AUSTRAC’s report on the Banking Sect...

AUSTRAC’s ML/TF Risk Assessment Report on Foreign Bank Branches [Part 3] Explore More

Blog

5 reasons why passwords are no more safe – What’s next?

Online platforms are using passwords to secure the privacy and data of their users – but ar...

5 reasons why passwords are no more safe – What’s next? Explore More

Blog

Why KYC Solutions are becoming a norm in Cryptocurrency?

KYC Solutions provide a great opportunity for crypto exchanges and virtual currency enthusiasts t...

Why KYC Solutions are becoming a norm in Cryptocurrency? Explore More

Blog

Protect Your Bitcoin Business With KYC Compliance

Even with a lot of resistance to its use as a form of currency, Bitcoin and its blockchain techno...

Protect Your Bitcoin Business With KYC Compliance Explore More

Blog, Financial Crime / AML

Challenges of AML Compliance under FinCEN

AML Compliance for US based Cryptocurrency companies has been tightened by Financial Crimes Enfor...

Challenges of AML Compliance under FinCEN Explore More

Blog, Fraud Prevention

Credit Card Frauds- How Can You Prevent It?

Ever since credit cards were introduced, credit card fraud has been elevating. One needs to stay ...

Credit Card Frauds- How Can You Prevent It? Explore More

Blog

Securing Cryptocurrency Sector and Fighting Financial Crimes With Shufti’s AML Solution

A decade ago, digital currencies were an academic concept, largely unknown to the world’s general...

Securing Cryptocurrency Sector and Fighting Financial Crimes With Shufti’s AML Solution Explore More

Blog

A Brief Overview of the RegTech Industry [2022 Update]

The rising financial crimes have raised concerns of global regulatory watchdogs giving rise to Re...

A Brief Overview of the RegTech Industry [2022 Update] Explore More

Blog

The Evolution of Video KYC: Revolutionise the Fintech Industry

FinTech encompasses financial organisations’ use of computing and communications tools to b...

The Evolution of Video KYC: Revolutionise the Fintech Industry Explore More

Blog

Safeguarding Financial Operations with Transaction Monitoring and AML Screening

To enhance the power of anti-money laundering regulation, transaction monitoring systems have evo...

Safeguarding Financial Operations with Transaction Monitoring and AML Screening Explore More

Blog

Video KYC Verification – Reimaging Customer Onboarding in 2023

As technology is advancing so do fraudsters, ringing security alarms for financial businesses and...

Video KYC Verification – Reimaging Customer Onboarding in 2023 Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started