© Chery F. Kendrick & Kendrick Technical Services.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flag Rules: What they are? & What you need to do
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Preventing Mail Theft Presented by American Crime Prevention Institute.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Chery F. Kendrick & Kendrick Technical Services.
Red Flags Compliance How It Has Changed Customer Policies & Procedures Teresa Corlew, Vice President Customer Care Nashville Electric Service September.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
© Chery F. Kendrick & Kendrick Technical Services.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Internet Safety Dr. Steve Broskoske Misericordia University.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
© Chery F. Kendrick & Kendrick Technical Services, LLC.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
R ed F lag R ule Training for the Veterinary Industry © Chery F. Kendrick & Kendrick Technical Services.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Presented By Plano Police Department Crime Prevention Unit.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Your Assets By Preventing Identity Theft 1.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
1 Identity Theft Prevention and the Red Flag Rules.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Fraud: Identity Theft G.1 List and explain consumer protection laws, including credit reporting, debt collection, and privacy. G.2 Define common, unfair.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Presented by: David Reid, DBA International
Identity Theft It’s a crime!
Business Partner Screening
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
Identity Theft Prevention Program Training
FACT Act Training for Staff Identity Theft “Red Flags”
Getting the Green Light on the Red Flags Rule
Identity Theft and Credit Safety
Presentation transcript:

© Chery F. Kendrick & Kendrick Technical Services

Presented by: Dr. Chery F. Kendrick Kendrick Technical Services © Chery F. Kendrick & Kendrick Technical Services

 Define the Red Flag Rule  Identify who must comply and why  Identify risks for and ways to prevent, detect or minimize the effects of identity theft  Discuss a compliance program to address risks and respond to flags © Chery F. Kendrick & Kendrick Technical Services

 Identifies Risk Factors  Discusses Protective Measures  Discusses Fraud Alerts  Presents Simplified RFR Form Packages © Chery F. Kendrick & Kendrick Technical Services

The Red Flag Rule is a relatively new rule developed by the FTC (Federal Trade Commission) to help prevent identify theft and credit card fraud © Chery F. Kendrick & Kendrick Technical Services

Could this apply to you? YES! The FTC ruled medical practitioners must comply © Chery F. Kendrick & Kendrick Technical Services

… and all patients pay in full at time of service, you likely will not have any Red Flag Rule issues. However, if you extend credit, bill patients, set up payment plans, or file insurance claims the RFR does apply to your practice. © Chery F. Kendrick & Kendrick Technical Services

 We are considered creditors when we allow patients to pay over time or accept credit applications on their behalf, for example, through CareCredit or through their insurance.  Thus, we must have a program to address the risk of identity theft, and train employees. © Chery F. Kendrick & Kendrick Technical Services

 It’s not HIPAA- the RFR protects financial information not medical info  Specifically for protection of consumers (that would be our patients) from identity theft  HIPAA policies can overlap with the RFR in terms of identity protection (such as Social Security Numbers) © Chery F. Kendrick & Kendrick Technical Services

 Designate a Privacy Officer, (for example, your Safety Officer or Practice Manager)  Determine potential risks in your front office, billing and record keeping procedures (use checklist)  Have a written protocol on file (use RFR policy) © Chery F. Kendrick & Kendrick Technical Services

 Protecting the practice and its patient’s information is everyone’s concern from the front desk to the exam rooms to treatment areas and labs. All areas,all personnel need to be made aware.  The Red Flag Rule also requires that we notify all suppliers, tech support, cleaning crew, et al that their adherence to the Red Flag Rule compliance program is required © Chery F. Kendrick & Kendrick Technical Services

 That’s where I come in ◦ As a regulatory specialist I understand your time constraints and “one more government regulation” to follow ◦ I have developed the tools you need ◦ RFR policy ◦ RFR Checklist ◦ RFR Training Programs ◦ It’s that simple © Chery F. Kendrick & Kendrick Technical Services

 Go over the risk assessment checklist (next slide)  Read the RFR policy  Set up training for management and all employees  Send notification to vendors and suppliers  Review policy and training annually © Chery F. Kendrick & Kendrick Technical Services

 Has the clinic ever had a case of identity theft?  How do you protect patient’s personal information when transmitting payments or dealing with outside service providers such as insurance companies or pharmacies? © Chery F. Kendrick & Kendrick Technical Services

 New Patient forms – what personal information do you collect?  DL#? SS#? Credit Card#?  When a patient calls for refill of meds, how is that billed? Account info accessed? How is file and info protected?  Secondary vendors: what information do they receive about patient?  Do vendors have own RFR protocol? © Chery F. Kendrick & Kendrick Technical Services

 All employees should be trained on the RFR compliance policy  As with all training there should be an annual review  New employees should have RFR training © Chery F. Kendrick & Kendrick Technical Services

 Employee records SSN Medical information Checking acct info for direct deposits Payroll information  Clinic Information Medical license numbers Credit card numbers Bank records © Chery F. Kendrick & Kendrick Technical Services

 Beware of what you put in the trash un-shredded. Thieves use contents of trash containers to steal identities.  Shred all messages or notes with information about personal records such as addresses, and billing info.  Don’t forget electronic media: shred discs, clear out files before disposing of computer. © Chery F. Kendrick & Kendrick Technical Services

 On completing your Red Flag Rule training  Main Points:  1) Guard personal information collected  2) Be careful with credit applications  3) Be vigilant and report suspicious activity  4) Review Red Flag Rule Protocol  5) Train new employees on Red Flag Rule © Chery F. Kendrick & Kendrick Technical Services

Call “Doc Chery” Dr. Chery F. Kendrick Regulatory Specialist Kendrick Technical Services © Chery F. Kendrick & Kendrick Technical Services

Dr. Chery F. Kendrick Regulatory Specialist © Chery F. Kendrick & Kendrick Technical Services