Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
©2012 CliftonLarsonAllen LLP Red Flags- Why This Matters to You An overview of the FACT Act Identity Theft Red Flag Rule and its current impact.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
What You Need to Know Customer Service 1 08/09/2012.
Detecting, Preventing, and Mitigating Identity Theft
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
Protecting Your Assets By Preventing Identity Theft 1.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Protecting Your Assets By Preventing Identity Theft
Top Compliance Topics.
University of St. Thomas
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Your Credit and the Law Chapter 27 5/24/2019.
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Prevention of Identity Theft

Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business to do this anyway. The Massachusetts Data Privacy Regulations become effective January 1, 2010 (TJ Maxx and Martha Coakley) Changes to HIPPA as outlined in the American Recovery Reinvestment Act of 2009 that went effect in February, 2010

Why do we need the regulations? Data and identity theft is being conducted by organized, motivated, and sophisticated groups that are well compensated for their success.* The FTC estimates annual losses to business from data and identify theft amount to almost $50 billion.* Tests done by groups assessing for the security of data are able to access highly sensitive information 90% of the time.* CCHC data belongs to our neighbors, our families and ourselves! We have seen identity theft at CCHC. *”10 Minutes on Data and identity Theft” Price Waterhouse Coopers 10/08

The New CCHC Policy… Requires an Annual Report of compliance with the policy from each entity. Depends on all employees being aware of flags that might signal an Identity Theft and reporting those flags to your supervisor. Requires all areas who conduct registration / intake to include a copy of a photo ID issued by a government entity. If no photo ID, ask for two forms of non-photo ID (not a credit card or bank statement)

What are Identity Theft Flags? When you see one of the following examples consider this may be an alert that Identity Theft might be occurring:

Suspicious Documents: Documents provided for identification that appear to have been altered or forged. A photograph that does not match the face. Other information on the identification is not consistent or does not match what we have on file. Documents that appear to have been altered or forged, or gives the appearance of having been destroyed and reassembled.

Suspicious Personal Identifying Information: The address does not match an address on any other type of document or the phone is invalid out of service or is a pager/answering service. The Social Security Number (SSN) has not been issued, or is listed on the Social Security Administration's Death Master File. There is a lack of correlation between the SSN range and the date of birth. The address on an application is fictitious, a mail drop, or a prison.

Unusual or Suspicious Activity Related to a Covered Account: Mail sent to the patient is returned repeatedly as undeliverable although transactions continue to be conducted in connection with the patient's covered account. We are notified that the patient is not receiving paper account statements.

Other Identity Theft Flags: Alerts, Received from Consumer Reporting Agencies or providers, such as Fraud Detection Services. We are notified by a patient, a victim of identity theft, a law enforcement authority, or any other person that we have an account for a person engaged in identity theft.

What do I do if there is no ID? Providing identification is not a condition for obtaining emergency care. The process of confirming a patient's identity must never delay the provision of an appropriate medical screening examination or necessary stabilizing treatment for emergency medical conditions. Patients should not be refused care if they do not have acceptable identification. Ask the patient to bring ID with them the next time they visit.

How do we respond to an Identity Theft Flag? monitoring an account for evidence of identity theft; contacting the patient; changing any passwords, security codes, or other security devices that permit access to an account; reopening an account with a new account number;

More options: Not opening an account or closing an existing account; Not attempting to collect on an account or not assigning an account to a debt collector; Consulting with the Compliance Officer who may notify law enforcement officials and/or suspected victims; or determining that no response is warranted under the circumstances presented due to a lack of sufficient facts/proof or otherwise.

What else do I need to know? If you see anything suspicious please report it to your supervisor right away. It may not be anything, but you may be the first person to detect a theft and you may be helping a person who has had their identity stolen.

Who is Responsible for Oversight at My Entity ?