Who is accessing healthcare assets and data?
Healthcare identity verification and authentication is often substandard, as I noted in a prior Bredemarket blog post entitled “Medical Fraudsters: Birthday Party People.” In too many cases, all you need to know is a patient’s name and birthdate to obtain fraudulent access to the patient’s protected health information (PHI).
But healthcare providers need to identify more than just patients. Providers need to identify their own workers, as well as other healthcare workers.
Know Your Visitor
Healthcare providers also need to identify visitors. When a patient is in a hospital, a rehabilitation facility, or a similar place, loved ones often desire to visit them. (So do hated ones, but we won’t go there now.)
I was recently visiting a loved one in a facility that required identification of visitors. The usual identification method was to present a driver’s license at the desk. The staffer would then print out a paper badge showing the visitor’s name and the validity date.
Like this…

So John “Bederhoft” (sic) enjoyed access that day. Whoops.
Oh, and I could have handed my badge to someone else after a shift change, and no one would have been the wiser.
Let’s apply “somewhat you why”
There’s a more critical question: WHY was John “Berdehoft” visiting (REDACTED PHI)? Was I a relative? A friend? A bill collector?
My proposed sixth factor of identity verification/authentication, “somewhat you why,” would genuinely help here.
Somewhat you why “applies a test of intent or reasonableness to any identification request.”
Maybe I should have said “and” instead of “or.”
- Visiting a relative shows intent AND reasonableness.
- Visiting a debtor shows intent but (IMHO) does NOT show reasonableness.
Do you need to analyze healthcare identity issues for your healthcare product or service? Or create go-to-market content for the same? Or proposals?
Contact me at Bredemarket’s “CPA” page.



