Steps to Prevent Back-Office Fraud Determining if employees are using sensitive information improperly, and how to stop it By Carrie Rossenfeld Ideally, all your employees and outsourced personnel would have a strong enough moral compass to keep personal information such as patient records, payment information and other sensitive data private and only used the way it was intended. The reality is that back-office fraud happens more often than you might think, and it can seriously damage your practice in more ways than one. “Back-office fraud is more prevalent than people believe,” says Howard E. Bogard, a partner at Burr & Forman LLP in Birmingham, Ala. “A few hundred dollars here and there soon adds up to significant losses.” In addition to affecting your bottom line, back-office fraud can also damage your reputation and your patients’ privacy, which can further affect you financially. “[Back-office fraud can] expose the medical practice to derivative liability, to the extent that the fraudulent activities involve or affect third parties, such as patients (where the fraudulent practice includes disclosing confidential and privileged patient information to third parties),” says Robert Berg, a member of EptsteinBeckerGreen in Atlanta. “Even though the employee or employees involved undoubtedly would be acting outside the course and scope of employment, injured parties most certainly would look to the medical practice, as the employer and obvious ‘deep pocket,’ to be liable for the damages resulting from the acts of employees.” Also, fraudulent activities and their aftermath can negatively affect the smooth running of your practice. “Once the fraudulent scheme is discovered, the disruption in the medical practice—e.g., the distraction on normal functioning, the impact on employee morale, etc.—can be costly,” Berg adds. How does back-office fraud present itself? Back-office fraud in a medical practice typically arises in two forms: embezzlement of funds or identity theft, says Bogard. (Read MOT’s article: “5 Steps to Prevent Patient Identity Theft”) Embezzlement seems to be more prevalent in smaller physician offices where one person may handle receivables, accounts payable and have access to the practice’s bank account, while identity theft can occur in all medical practices, especially if the medical charts contain social security numbers and financial information. Michael Collins, VP Central US for Shred-it in Oakville, Ontario, Canada, says that the Word Privacy Forum estimates that there are approximately 250,000 to 500,000 medical identity theft issue per year in the US, and on average, it costs organizations $6.3 million per breach. “The majority of all security breaches are insider issues and involve employees that aren’t compliant with a facility’s policy.” He adds that, in assessing risk in healthcare organizations, his firm sees a lot of security gaps that can lead to fraud issues. (Read MOT’s article: “Data Security: Protecting Against Insider Threats”) “One major issue surrounds how employees are handling the hard drives in their copiers and laptops, and, of course, whether or not paper is disposed of in a secure manner.” Employee theft of retired computer equipment is a common situation that creates massive liability for unknowing medical practices, says Kyle Marks, CEO of Retire-IT LLC in Columbus, Ohio. (Read MOT’s article: “Improving Your Electronic Data Security”) “Frequently retired computers contain private data that can create massive liability for a medical practice when it is lost, stolen or inadvertently disclosed.” Be aware that back-office fraud is not limited to highly sophisticated schemes requiring specialized knowledge to uncover. “Quite the contrary, exceedingly simple fraudulent plans—pocketing a small amount from each day’s deposit of cash co-payments, using an unknown extra corporate credit card, creating a bogus vendor for highly used supplies, etc.—can prove to be extremely costly,” says Berg. What should practices do to prevent back-office fraud? The medical community and, in particular, administrators need to think about medical files that may be left unattended or unsecured, says Collins. “There may be people coming and going that are not background checked, and they walk into unrestricted areas, and that can lead to a security breach.” Obviously, protecting your data is the first step toward prevention. Physically destroying documents to ensure that sensitive information doesn’t get into the wrong hands is primary, but there’s more you can do. “Organizations should also use locked, non-pliable containers that can’t be moved to ensure that confidential information is securely held prior to pick-up and destruction,” says Collins. “On-site destruction is recommended as the most secure way to guarantee a secure chain of custody for all confidential information.” It’s very important to have checks and balances in place to make sure that no one person is in a position to implement a fraudulent scheme, says Berg. “Once the system of checks and balances is in place, it is critical to follow the system and not take shortcuts. In many cases, the success of a fraudulent plan comes about because medical practice staff get used to taking shortcuts, skipping steps, ignoring certain rules, etc., which, if not done, might have kept the scheme from being implemented or from succeeding.” Berg’s firm also advises medical practices to be vigilant in checking on all systems periodically and, when something looks out of whack, following up to make sure it is not the tip of the fraudulent-scheme iceberg. “It is amazing how a medical practice will be totally surprised by a back-office scheme which has been in place for many years, despite obvious visible signs that it existed, which were, in essence, ignored or dismissed as immaterial.” The same person should not be involved in both collections and accounts payable, says Bogard. Access to the practice’s bank account should be closely monitored, and checks or withdrawals above a certain dollar amount ($500 or $1,000, for example) should require a signature of a physician owner. Someone other than the employee cashing and writing checks should review bank statements to identify any suspect or suspicious withdrawals. Also, to combat identity theft, discontinue the use of social security numbers, limit access to medical charts and patient financial information on a need-to-know basis, and train employees on the importance of protecting patient confidentiality, Bogard adds. If you accept credit cards, limit access to that information to only those employees who need it to process payment. In addition, keep an eye out for employees that seem to be making purchases or taking trips that appear excessive given their compensation. What if a practice suspects fraud is taking place? Any suspect activity should be quickly investigated, and if embezzlement or identity theft is believed to have occurred, notify the local police, says Bogard. Once the fraud has been discovered, it is critical to move quickly and decisively, adds Berg. “In many cases, the employee involved will have a good reputation and will have worked for the practice for several years. Oftentimes, it is this clean, trustworthy reputation that allows the employee to ‘get away’ with the plan for long periods of time.” If your first inclination is to be gracious and avoid taking drastic steps—such as suspending or terminating the employee, involving law enforcement, having the employee arrested or getting forensic accountants involved—don’t listen to it. “This is usually a bad move, as over time, the medical practice is likely to learn the full extent of the scheme and the resulting financial damage to the practice,” says Berg. “It is much better to assume the worst, get to the bottom of the fraudulent scheme as soon as possible and act accordingly.” It may also be appropriate for you to carry insurance coverage for employees’ fraudulent acts, such as embezzlement. Coverage is not overly expensive and can come in very handy in the typical back-office fraud scenario, Berg adds. Other steps you can take to prevent back office fraud include: Listing all information security risks specific to your organization so you’re aware of where you might be vulnerable. Develop stringent and enforceable policies regulating access to sensitive patient information and authorization and authentication of individuals accessing health information. Train your employees in best practices in secure information management and destruction. Securely destroy all medical information—in electronic and paper form—that is no longer required to be kept on record. Outsource information destruction to high-quality professional providers who ensure the total security of the information destruction process and can provide documentation to certify that the chain of custody has been maintained and the work has been completed. Partner with a document-destruction specialist to audit your operations and help you identify gaps in security. Have a clearly defined security policy and make sure that all employees are accountable in upholding it. Hire a reputable “IT asset disposal” vendor to ensure that retired electronics are responsibly recycled.
© Copyright 2026 Paperzz