 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a Red Flag: Understanding the Fair and Accurate Credit Transactions Act, the Red Flag.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
WELCOME Iowa State University Identity Theft Prevention Program
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Comprehensive Orthopaedic and Musculoskeletal Care, LLC
Copyright © 2008 Delmar Learning. All rights reserved. Chapter 4 Life Cycle of an Insurance Claim.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Identity Theft Prevention Program Fighting Fraud at The University of Montana Red Flags Rules.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Red Flag Rule and Medical Identity Theft Prevention Program
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
© Chery F. Kendrick & Kendrick Technical Services.
Detecting, Preventing, and Mitigating Identity Theft
© Chery F. Kendrick & Kendrick Technical Services.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
The FTC’s Red Flag Rule. FTC Red Flag Regulations Why the Red Flag Regulations?
© Chery F. Kendrick & Kendrick Technical Services, LLC.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
R ed F lag R ule Training for the Veterinary Industry © Chery F. Kendrick & Kendrick Technical Services.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
PATIENT IDENTITY RESOLUTION FOR SMARTER HEALTHCARE
University of St. Thomas
Red Flags Rule An Introduction County College of Morris
Red Flag Review and Updates
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
FACT Act Training for Staff Identity Theft “Red Flags”
Getting the Green Light on the Red Flags Rule
Presentation transcript:

 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement Delayed Twice to 8/1/09  Creditors must implement written policies/procedures to prevent, detect and mitigate identity theft related to consumer accounts › TTUHSC OP – 4/30/09

 TTUHSC is a Creditor › Regularly defers payment for goods or services or provides goods or services and bills later. › FTC stance: Physicians who accept insurance or payment plans are “creditors”.  TTUHSC has Consumer Accounts › Accounts permitting multiple payments › Accounts where there is a reasonable foreseeable risk of identity theft  BUT, WHAT ABOUT HIPAA?

 Identity Theft › Fraud committed or attempted by an individual using another person’s identifying information to obtain goods/services  Identifying Information › Name; SSN; birth date; phone number; government identity card (license, passport, visa); PHI, bank/credit/debit account numbers insurance information, biometric information; electronic identification information

 Identify relevant “Red Flags” › Those likely to encounter during business operations  Detect Red Flags › Establish procedures to detect red flags in day-to-day operations  Prevent & Mitigate Identity Theft › Respond to red flags found  Update the Program

 Electronic Data/Interchanges › External Security Breaches › Internal Security Breaches  Physical Points of Service › Setting up a New Patient › Patient Encounters – Medical Information › Account Collection Activity VERIFYVERIFYVERIFY

 Types › False Identity › Use another individual’s insurance information to obtain health care items/services  Risks › Non-payment/Refund to the Insurer › Inaccurate medical history for the insured › Inaccurate/False Medical Record › Inaccurate billing information

 Current OB Patient previously received OB care under a false identity.  Patient receives treatment using cousin’s insurance card  Patient does not use real name to receive treatment.  Patient denies having received treatment from the provider.

 A RED FLAG › DOES NOT EQUAL IDENTITY THEFT › IS AN INDICATOR OF POSSIBLE IDENTITY THEFT  Categories of “Red Flags” – Attachment A › Credit Report Alerts › Suspicious Documents/Identity Information › Suspicious Activity › Patient Notices/Complaints

 Patient Complains that items/services billed were not received by them  Patient’s medical histories are inconsistent  Patient uses various “aliases” to receive services  False/Forged Documentation Presented  Patient complaint/question about collections or entry on a credit report

 Insurer denial of coverage for the service because patient previous received the service › Appendectomy; Hysterectomy; etc.  Insurance Information Does Not Match Patient Information  Patient Personal Information Does Not Match Information Presented or on File › Photo IDs, Insurance Card

 Educate Staff on Medical Identity Theft and Detecting Red Flags › What is a “red flag” – 52.10, Attachment “A” › Who to Contact?  Supervisor/Manager/Administrator  Institutional Privacy Officer  Institutional Security Officer (Identified security breach)

 New Patients: › Copy of current insurance cards › Over 16 years of age: Government-issued ID checked and copied for medical record › Under 16 years of age: Other government – issued documents  Copy of Birth Certificate for medical record  Copy of School Enrollment  Patient Refusal – Contact Supervisor

 Existing/Returning Patients › Verify patient matches photo ID – get copy if not already in the medical record › No photo ID – Verify patient using other individual identifying information, such as:  Address  Phone number  Last 4 of Social Security Number  Other unique information (last visit; insurer; etc.) › You may already be doing some or all of this

 Patient Complaint/Notice  Unusual/Suspicious Activity/Information › Medical Record Information › Payment Denials › Insurer Inquiries related to a submitted claim › Name discrepancies › Number of children › Active patient with mail returned as undeliverable

 FTC Fighting Fraud with Red Flag Rules  AMA Publication  FTC Website