The Red Flag Rule and Medical Identity Theft Prevention Program

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Confidentiality and HIPAA
Comprehensive Orthopaedic and Musculoskeletal Care, LLC
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Are you ready for HIPPO??? Welcome to HIPAA
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
© Chery F. Kendrick & Kendrick Technical Services.
Lesson 9-3 Consumer Protection Laws LEARNING GOALS -LIST AND EXPLAIN CONSUMER PROTECTION LAWS THAT ARE RELATED TO CREDIT -DISCUSS THE PROCESSES OF USING.
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
DEFENSE PRIVACY & CIVIL LIBERTIES OFFICE Privacy Foundations Samuel P. Jenkins Director for Privacy Defense Privacy and Civil Liberties Office Identity.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Small Business and Personal Credit
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Protecting Your Identity:
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
The Health Insurance Portability and Accountability Act
Presentation transcript:

The Red Flag Rule and Medical Identity Theft Prevention Program

MEDICAL IDENTITY THEFT “Medical Identity Theft” occurs when someone uses a person’s name and other parts of their identity―such as insurance information or social security number―without the victim’s knowledge or consent to obtain medical services or goods. In DOD theft may not always involve third party insurance.

Facts About Medical Identity Theft Fastest growing national crime Estimated 1 in 23 identity theft victims are victims of medical identity theft Nationally more than $70 to $255 billion estimated annual loss in healthcare fraud charges Estimated national average cost to clean up records after an incident of identity theft - $182.00 per record 3

Incidence of Medical Identity Medical identity theft cases reported to Federal Trade Commission (FTC): - 2.5 million in 2005. - Over 3.6 million cases reported in 2007 - Most are not reported. 4

Common Types of Medical Identity Theft One-off (involves relative /friend using health insurance card or the theft or selling of health insurance cards) Insider (employee stealing health insurance information and selling it) Organized Crime Drug-seeking Behavior 5

FTC Red Flags Background The Fair Credit Reporting Act (FCRA), enacted on October 26, 1970, is an American federal law that regulates the collection, dissemination, and use of consumer credit information and is enforced by the US Federal Trade Commission Fair and Accurate Credit Transactions (FACT) Act is a United States federal law, enacted on December 4, 2003, as an amendment to the FCRA Federal Trade Commission (FTC) Red Flags Rule – Implements sections 114 and 315 of the FACT Act, effective 1 January 2008 and enforcement is extended to 1 November 2009 The Red Flags Rule requires each MTF to develop a program to prevent, detect, and minimize damage from identity theft

FTC Red Flags “Red Flags” are defined as a pattern, practice, or specific activity that indicates the possible risk of identity theft. The term “Red Flag” is used to denote the flagging/identification system to identity accounts where suspected identity theft has occurred. The Red Flags Rule applies to “financial institutions” and “creditors” with “covered accounts” . Medical treatment facilities (MTFs), are considered creditors since we bill some patients, extend credit to patients, allow multiple payments, or accept third-party payment for services furnished. Creditors are entities that are at risk for is identity theft.

Current Legislation and Guidance Federal Laws Health Insurance Portability and Accountability Act of 1996: Privacy Rule Security Rule 44 USC Ch. 31 Records Management Program Freedom of Information Act of 1966 E-Government Act of 2002 Reporting Requirements Congress Office of Management and Budget (OMB) US-CERT (Computer Emergency Response Team) Dept of Health and Human Services (HHS) Assistant Secretary of Defense (Networks & Information Integration) DoD Inspector General (IG) DoD Privacy Office Federal Information Security Management Act (FISMA) Privacy Act of 1974 DoD Governance DoD 5400.7-R DoD Freedom of Information Act Program DoD 5200.1-R Information Security Program DoDI 8510.01 DIACAP (C&A) DoD 6025.18-R DoD Health Information Privacy Regulation ASD(HA) Memo Breach Notification Reporting for the MHS DoD 8580.02-R DoD Health Information Security Regulation DoDI 5400.16 DoD Privacy Impact Assessment (PIA) Guidance DoD 8500.1 & 2 Information Assurance (IA) DoD 5400.11-R DoD Privacy Program Types of Data Personally Identifiable Information (PII) Electronic Protected Health Information (ePHI) Protected Health Information (PHI) 8

Red Flag Rules Red Flags fall into five categories: Alerts, notifications, or warnings from a consumer reporting agency; Suspicious documents; Suspicious personally identifying information, such as a suspicious address; Unusual use of – or suspicious activity relating to – a covered account; and Notices from customers, victims of identity theft, law enforcement authorities, or other businesses about possible identity theft in connection with covered accounts. This information is taken directly from the FTC Web site cited in the reference slide. If you are interested in reading more about the Red Flag Rules, please go to the Web site listed there. As for DDEAMCwe have the following plans regarding implementing the Red Flag Rules: (State your plans in whatever detail you are comfortable sharing). 9

FTC Red Flags Rule Specific FTC Red Flags Rule requirements include: Identifying relevant Red Flags and incorporate those Red Flags into the Incident Response and Reporting program Detecting Red Flags Responding appropriately to any Red Flags that are detected Ensuring the program is updated and evaluated periodically An MTF Red Flag Coordinator will be appointed to investigate all Red Flag inquiries

PII/PHI Data The sensitivity of data is important in determining the level of protection and privacy required Such data may include Personally Identifiable Information (PII) and Protected Health Information (PHI) Even a small amount of PHI or PII can be used to determine the individual’s personal identity The definition of data includes paper-based records as well as electronic media

Examples Examples Name Social Security Number Age Date and place of birth Mother’s maiden name Biometric records Marital status Military Rank or Civilian Grade Race Salary Home/office phone numbers Other personal information which is linked to a specific individual (including Health Information) Electronic mail addresses Web Universal Resource Locators (URLs) Internet Protocol (IP) address Claim form Electronic claim form Payment history Account number Name and address of health care provider Diagnosis Number of years of military service* Personally Identifiable Information (PII) Information which can be used to distinguish or trace an individual’s identity, including personal information which is linked or linkable to a specified individual Protected Health Information (PHI) Information that is created or received by a Covered Entity and relates to the past, present, or future physical or mental health of an individual; providing or payment for healthcare to an individual; and can be used to identify the individual * Combining number of years with rank can comprise PII

Impact on the Patient Possible Consequences of Medical Identity Theft Wrong information in the record can lead to: 1. Future denials of insurance coverage 2. False claims that count toward a lifetime maximum 3. False diagnoses Unsafe or deadly care Increased insurance costs resulting from incorrect medical information. 13

Impact on the HealthCare Provider The provider relies on the health record for the truth of the patient’s condition and status. The ability to provide the correct treatment to the correct patient depends upon the accuracy of the health record. 14

Impact on the HealthCare Provider When the record is on paper, separating the true from the false information can be difficult, but in the electronic record, it is even more complicated. 15

Impact on the HealthCare Organization Damaged Reputation and Lack of Trust in MTF by patients – Patients expect the information that they provide the MTF to be kept confidential and secure from theft. Increase costs in time and effort spent in correcting erroneous information Potential lawsuits from patients Possible HIPAA complaint Possible Accreditation issues 16

List of Suggested Red Flags Identifying Red Flags List of Suggested Red Flags A complaint or question from a patient based on the patient’s receipt of: A bill for another individual; A bill for a product or service that the patient denies receiving; A bill from a health care provider that the patient never patronized; or A notice of insurance benefits (or explanation of benefits) for health care services never received.  Records showing medical treatment that is inconsistent with an outpatient encounter, admission, or medical history as reported by the patient (Reminder, identity theft may not involve Third Party billing). A complaint or question from a patient about the receipt of a collection notice from a bill collector.

Identifying Red Flags List (cont’d) A patient or health insurer report that coverage for legitimate hospital stays is denied because insurance benefits have been depleted or a lifetime cap has been reached.  A complaint or question from a patient about information added to a credit report by a health care provider or health insurer.  A dispute of a bill by a patient who claims to be the victim of any type of identity theft. A patient who has an insurance number but never produces an insurance card or other physical documentation of insurance. A notice or inquiry from an insurance fraud investigator for a private health insurer or a law enforcement agency

Detecting Red Flags Be alert for discrepancies in documents and patient information that suggest risk of identity theft or fraud Use patient verification processes that include Military ID photo identification. Make sure the process is as thorough as possible Require identifying demographic information (e.g., full name, date of birth, address, military ID, insurance card, etc.) to be verified at the time of the patient registration/check-in Ensure that accurate third party insurance information is collected. CHCS should be updated to reflect current information, as well as, Other Health Insurance Form ( DD Form 2569)

Responding to Red Flags Promptly report the case to the immediate supervisor or Red Flag Coordinator for investigation and resolution The employee should gather all documentation and report the incident to his or her immediate supervisor or the Red Flag Coordinator The Red Flag Coordinator will investigate and determine whether the incident is substantiated or unsubstantiated. Actions take in substantiated cases may include: Cancellation of transaction; Notifying appropriate law enforcement Notifying the affected patient Notify affected physician(s); and Assess impact to practice

Scenario Best Practices to Safeguard Data and Prevent Breaches and Identity Theft

Scenario You will have a a few minutes to read a scenario and decide what to do Be sure to think about: What should you do immediately? What information should be retained and why?

Scenario You received an e-mail asking for a copy of a patient account record and any other identifying information to be sent electronically to an insurance company for payment The e-mail has all the appropriate logos and identification which is linked to a well-known insurance company headquartered in Albany, New York. You sent the information as requested Later in the day you noticed that there were three misspelled words in the text of the e-mail. There is also an extension to the insurance company’s e-mail address –“ru”- which you do not recognize What should you do?

Scenario What should you do immediately? Immediately notify your supervisor about these irregularities Follow your breach response procedures including recording how the information was received by you If appropriate, and part of your breach response process, seek assistance from Information Assurance (IA) on how to deal with this incident

Scenario What information should you retain and why? Be sure to note down all the relevant details Even if the information is not used now, it might be valuable later Be prepared to describe your experience in this situation to others so that it can be used in an investigation, and as part of a group training program

Suspected ID Theft The FACT Act enables consumers to request and obtain a free credit report once every twelve months from each of the three nationwide consumer credit reporting companies (Equifax, Experian and TransUnion) You have the right to ask that nationwide consumer credit reporting companies place "fraud alerts" in your file to let potential creditors and others know that you may be a victim of identity theft The website, www.annualcreditreport.com, provides free access to annual credit reports Report suspected cases of medical identity theft to the HIPAA Privacy Officer, XXX-XXX-XXXX

Questions? Comments?

FTC Red Flags “Red Flags” are defined as a pattern, practice, or specific activity that indicates the possible risk of identity theft “Identity Theft” occurs when someone uses a person’s name and other parts of their identity―such as insurance information or social security number―without the victim’s knowledge or consent to obtain medical services or goods, or when someone uses the person’s identity to obtain money by falsifying claims for medical services and falsifying medical records to support those claims. The Red Flags Rule applies to “financial institutions” and “creditors” with “covered accounts” . Medical treatment facilities (MTFs), are considered creditors since we bill some patients, extend credit to patients, allow multiple payments, or accept third-party payment for services furnished. Creditors are entities that are at risk for is identity theft.