1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Understanding Your Credit Purdue Employees Federal Credit Union.
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Red Flag Rules: What they are? & What you need to do
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Revenue360 for QES version 13 Nick Davis & Jennifer Estes: Tuesday 8/20, 9-10 AM.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
1 Identity Theft and Phishing: What You Need to Know.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
MIFOS TRAINING SLIDES. 2 KNOW YOUR CUSTOMER KNOW YOUR CUSTOMER It is the policy of (ENTER YOUR ORGANIZATION’S NAME HERE) to comply with the (ENTER REGULATORY.
Detecting, Preventing, and Mitigating Identity Theft
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
FAIR CREDIT REPORTING ACT.  Serves the following principal purposes:  To regulate the consumer-reporting industry.  To prohibit unfair actions from.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
The FTC’s Red Flag Rule. FTC Red Flag Regulations Why the Red Flag Regulations?
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
1 1 Fees, Billing, Collections, and Credit Lesson 1: Fees, Billing, Collections, and Credit.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
NYSAIS | Webinar | May 11, 2011 Electronic Signatures and Red Flag Rules Presented by: Donald J. Mosher Partner Schulte Roth & Zabel LLP
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Fraud Procedures Tips for Mitigation Fraud Case Process.
University of St. Thomas
Red Flags Rule An Introduction County College of Morris
Red Flag Review and Updates
Identity Theft Prevention Program Training
Registration Process Admitting 1/6/2015
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System

2 Policy Statement and Purpose To establish procedures to comply with the Identify Theft Program Policy (the “Program”) for Mount Auburn Hospital (“MAH”) and Mount Auburn Professional Services (“MAPS”) designed to detect, prevent and mitigate identity theft in connection with the opening of a covered account or an existing covered account and to provide for continued administration of the Program

3 Red Flag Rules Section 114 of Fair & Accurate Credit Transaction of 2003 (FACT Act) Requires financial institutions and creditors to develop, implement and administer an Identity Theft Program Hospital falls into “creditor” as we establish accounts and allow “customers” to defer payment.

4 Definitions Identity Theft: Fraud committed or attempted using the identifying information of another person without authority. A Red Flag: A pattern, practice of specific activity that indicates the possible existence of identity theft.

5 Identification of Red Flags Suspicious Documents Suspicious Identifying Information Notices from other sources  Address discrepancy  Law enforcement  Victim of identity theft Please see Identity Theft Program Procedures in the Mt Auburn Administrative Manual for comprehensive list of Red Flags

6 Interviewing the Patient  Whether interviewed by phone or in person, all patients will be asked to verify their personal information as opposed to confirming existing information. For example, a patient will be asked to give their home address instead of being asked if they still reside at the address already in the system.  When interviewing a patient in person, all patients with a Red Flag Alert will be asked to provide a license or some form of picture identification. c) If no picture identification is available, each patent will be asked at least two identifying questions, such as date of birth, social security number, telephone number, etc. The verification questions will be determined by the Director.

7 A Patient with a Red Flag Alert in the MEDITECH Admissions Application A patient with a Red Flag will appear in the Admitting Look Up with an asterisk prefixed to the last name.

8 Patient Registration with Red Flag Pop Up Box appears to identify that the patient has a Red Flag

9 Detection of Red Flags Staff who detect a Red Flag must report their findings to the Department Manager. If the Red Flag identified requires immediate attention, staff are to report the information immediately to their Manager. The Director will monitor the reported Red Flags and respond as appropriate. All Red Flags will be reported to the Director of Health Information Management to be input the Meditech system to alert all staff of a potential flagged account. Each Red Flag Alert should be faxed to x1677 or send via a MOX message to the Director of Health Information Management.  a) If a patients requests information on an account that has a Red Flag Alert attached to it, the staff member will forward the patient to their Manager.

10 HIM Director Inputs Red Flag into Patient’s Record in MEDITCH via Medical Records Application The HIM Director adds VIP “Y” and VIP Comment to the patient’s record. The VIP flag triggers the asterisk to prefix the patient’s last name in the Admitting and B\AR Applications.

11 View Red Flag Status in PCI The Red Flag Demo Recall Information can be viewed in PCI under >Admissions Demographic Data >Patient Demographics NOTE: The asterisk does not appear on the patient’s last name in PCI.

12 Patient Financial Services Can View a Red Flag When Calling up an Account Patient last name prefixed with asterisk

13 V.I.P. Patient List The V.I.P Patient List is run from the Admitting Application. This list will identify all patients that are “Red Flagged” in the MEDITECH System on or after a specified Admission or Service Date.