Healing fraud in healthcare

August 2013 Access Control & Identity Management, Healthcare (Industry)

Research into the use of biometrics to reduce fraud in the medical scheme sector overseas is ongoing. Hi-Tech Security Solutions spoke to representatives from two medical schemes and the forensic audit manager from Netcare to find out whether there is or will be any uptake of the technology in South Africa.

A report in http://academia.edu by Dennis Backherms, a graduate in information technology from Capella University in the USA, takes an in-depth look at the inherent advantages and disadvantages of biometric technology in the healthcare sector.

According to Backherms: “Medical identity theft ranges from opportunists viewing medical information for personal insight, to people wanting medical attention but who do not have their own, or sufficient, medical insurance (funds) to cover costs.”

What’s up Doc?

Gerrie Isaacs, who is one of the forensic audit managers from Netcare said that to date Netcare has utilised biometrics exclusively for time and attendance purposes. As South Africa’s largest private hospital group, Netcare submits thousands of claims on a monthly basis to various medical aid schemes. “Sadly, a number of these claims are investigated due to fraudulent use of member cards by non-members.”

Graham Anderson, Profmed’s principal officer
Graham Anderson, Profmed’s principal officer

Graham Anderson, Profmed’s principal officer says that although this trend is not isolated to certain income sectors, there is definitely a predominance of occurrence within the lower income category. “Medical scheme membership is a cost that not all can afford. Even if a main member is on the scheme, if his/her income is relatively low, they will probably not be able to enrol all members of their immediate family on to the scheme. This is one instance when fraudulent use of a legitimate card is prevalent.

“Biometrics would definitely be the answer in reducing or even eliminating card identity theft. While patients being admitted are required to produce some form of identity, often the image cannot be definitively connected to the patient due to factors such as age and ill health. By asking a patient to verify their identity with a biometric fingerprint, we would be able to immediately ascertain whether the holder of the medical aid card and the legitimate owner of the card are one and the same,” Isaacs points out.

Is it viable in SA?

Medihelp’s principal officer and CEO, Anton Rijnen
Medihelp’s principal officer and CEO, Anton Rijnen

The million-dollar question is whether biometrics would work in the local medical scheme sector. Anderson and Medihelp’s principal officer and CEO, Anton Rijnen, do not believe biometric technology will find a welcome home in their industry.

Both men believe that the adoption of biometric technology would be the panacea to many ills, but the limitations to the adoption process are too numerous.

“In principle, biometrics can be used to reduce fraud in the medical schemes industry. However, the cooperation of service providers is required and it must be cost effective. Accessing the rural areas may be problematic as some of the locations where services are rendered might not have an adequate infrastructure or even electricity,” says Rijnen.

“We believe that every service provider should have an identical item of biometric equipment, irrespective of which medical scheme the patient belongs to. This would definitely aid in speeding up the claims process. In addition, very close attention should be paid to the authenticity of the patient during the biometric enrolment process,” he adds.

“The ideal situation would be for all medical schemes to share a common biometric database. However, this might be difficult due to the fact that there is not a single body representing all medical schemes. Furthermore, the legislative requirements should be considered if a shared biometrics database is used.

“The use of biometrics can be a benefit to all role players in the healthcare industry, as the identity fraud perpetrated against medical schemes is also identity fraud against the service provider. In addition, biometrics can be used to safeguard access to confidential patient information.”

Anderson says: “At this stage it would be impossible to implement a biometrics system due to the fragmentation within the industry. There are thousands of service providers and each of these would need to install a system in their rooms. The logistics around the sheer number of medical scheme members will also prove complicated for enrolment purposes. This is especially prevalent in the rural areas or where the main member is situated in one location and his/her dependants in a different area.

“This fragmentation is not only prevalent in the supplier industry but also in the medical scheme industry. Most medical schemes are members of the Board of Healthcare Funders. However, one of South Africa’s larger schemes is not a member, so uniformity would be difficult to enforce,” he adds.

“I do believe that if one were to start on a small scale and perhaps enrol one scheme with one hospital group, for instance, we could see some progress. Ultimately, the hospital groups need to motivate the adoption of biometrics to reduce fraud,” Anderson concludes.

Conclusion

Perhaps, the potential success of biometrics in the medical scheme sector can best be summarised by the aforementioned report: “Biometric technology in the health care industry will not reach its full potential until the trust of both the health care professional and consumer have understood its use does not threaten the privacy of personal information.”

The local medical scheme representatives that we spoke to echo this sentiment and cite logistics as well as mass acceptance as being the major stumbling blocks. For the immediate future then, the industry will continue to battle the incessant fraudulent use of member medical scheme cards.

Contacts

Medihelp: www.medihelp.co.za

Profmed: www.profmed.co.za

Netcare: www.netcare.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Here’s to a SMART 2026
SMART Security Solutions News & Events
This is the final news brief from SMART Security Solutions for 2025, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.