RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
© Chery F. Kendrick & Kendrick Technical Services.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Comprehensive Orthopaedic and Musculoskeletal Care, LLC
Springfield Technical Community College Security Awareness Training.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Red Flag Rule and Medical Identity Theft Prevention Program
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates,
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
HIPAA (health insurance portability and accountability act)
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Top Compliance Topics.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training

RMG:Red Flags Rule 2 Purpose of the Red Flags Rule To protect against identify theft. To train the workforce on identifying, detecting, and responding to identify theft. Penalties imposed for violations against compliance with the rule.

RMG:Red Flags Rule 3 Categories of Red Flags Alerts and notifications received from consumer reporting agencies or service providers such as fraud detection services. The presentation of suspicious documents. The presentation of suspicious personal identify information such as a suspicious address change. Suspicious activity related to a Covered Account. Notice from customers, victims of identity theft, law enforcement or others regarding identify theft.

RMG:Red Flags Rule 4 In the Course of Caring for Patients A complaint or question from a patient based on the patient’s receipt of: -A bill for another individual; -A bill for a product or service that the patient denies receiving; -A bill from a health care provider that the patient never patronized; or -A notice of insurance benefits (or explanation of benefits) for the health care services never received.

RMG:Red Flags Rule 5 Cont. In the Course of Caring for Patients Records showing medical treatment that is inconsistent with a physical exam or medical history as reported by the patient. A complaint or questions from a patient about receipt of a collection notice. A patient or health insurer reports that benefits have been depleted or a lifetime cap has been reached. A dispute from a patient who claims to be the victim of any type of identity theft. A patient who has an insurance number but never produces an insurance card or other physical documentation of insurance.

RMG:Red Flags Rule 6 Cont. In the Course of Caring for Patients The photograph on a driver’s license or other photo ID submitted by the patient does not resemble the patient. The patient submits a driver’s license, insurance card or other identifying information that appears to be altered or forged. An address or telephone number is discovered to be incorrect, non-existent or fictitious. The patient’s signature does not match a signature in the practice’s records. A notice or inquiry of an insurance fraud investigator or law enforcement, including a Medicare fraud agency.

RMG:Red Flags Rule 7 Protect Social Security Numbers Do not include a SSN on mail correspondence to members (i.e. bills, referrals. Authorizations/denials). Do not intentionally communicate or make available to the general public a member’s SSN. Do not require a member to transmit a SSN over the internet unless secure or encrypted.

RMG:Red Flags Rule 8 Work to Detect Red Flags Establishing policies & procedures to address the detection of Red Flags. Verifying the identity of persons opening a Covered Account. Authenticating customers, monitoring transactions and verifying the validity of information.

RMG:Red Flags Rule 9 Respond to Red Flags Respond to detected Red Flags. Contact the customer. Change passwords to Covered Accounts. Notify law enforcement. Investigate and determine what if any action is necessary.

RMG:Red Flags Rule 10 Periodically Update Processes Based on past experiences of identity theft. Based on changes in identity theft methods. Based on changes in methods to detect, prevent, and mitigate identity theft. Based on changes in business arrangements, including mergers, acquisitions, alliances, joint ventures, and service provider arrangements.

RMG:Red Flags Rule 11 Penalties Imposed For Non-Compliance The Federal Trade Commission may impose penalties of up to $2,500 per violation if a provider or business is deemed out of compliance with the Red Flags Rule.

RMG:Red Flags Rule 12 Responding to Red Flags If fraudulent activity involves protected health information (PHI) covered under HIPAA then HIPAA security policies and procedures will apply to the response. The employee should gather all documentation and report the incident to his/her immediate supervisor or designated compliance officer. The supervisor or designated compliance officer will determine whether the activity is fraudulent or authentic and take the appropriate actions it deems necessary.

RMG:Red Flags Rule 13 Definitions Account: financial institution or creditor to obtain the product or service. Identity Theft: a fraud committed or attempted using the identifying information of another person without authority. Red flag: A pattern, practice, or specific activity that indicates the possible existence of identity theft. Customer: a patient or person obtaining a service or product.