1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May 25. 2010 Chris Apgar, CISSP President, Apgar & Associates,

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
NAU HIPAA Awareness Training
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Practical Steps to Minimize Privacy Risks: Understanding The Intersection Between Information Management and Privacy Law Presented by Alexandria McCombs.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Texas Regional Entity Update Sam Jones Interim CEO and President Board of Directors July 18, 2006.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
STATE OF ARIZONA BOARD OF CHIROPRACTIC EXAMINERS Mission Statement The mission of the Board of Chiropractic Examiners is to protect the health, welfare,
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
April 14, 2003 – HIPAA Privacy Audioconference The Importance of April 14, 2003: Where you should be regarding HIPAA privacy policies and procedures and.
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
Health Care: Privacy in a Digital Age
Identity Theft Prevention Program Training
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Clemson University Red Flags Rule Training
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Introduction to the PACS Security
Presentation transcript:

1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates, LLC

© Apgar & Associates, LLC2 Agenda  Red Flags Rule Overview  State & Breach Notification Requirements  Definition of “Red Flags”  Identity Theft Protection Program Requirements  Implementation Tips  Q & A

2010 © Apgar & Associates, LLC3 Red Flags Rule Overview  Result of Fair and Accurate Credit Transaction Act of 2003 (FACTA)  Amendment to Fair Credit Reporting Act  Final Red Flags Rule published November 2007  Original enforcement date was moved from November 2008 to June 1, 2010  Rules will be enforced by the Federal Trade Commission (FTC)

2010 © Apgar & Associates, LLC4 Red Flags Rule Overview  Applies to “creditors”  Physicians today classified as “creditors”  “Creditor” is defined as:  Maintain “covered account” (for physicians this is the patient account where patient is not required to pay for treatment or fully pay for treatment at the time treatment is rendered)  Participates in the decision whether or not to issue credit

2010 © Apgar & Associates, LLC5 Red Flags Rule Overview  Physicians may or may not ultimately be considered “creditors” based on American Bar Association court finding that attorneys are not regulated by the Red Flags Rule  American Medical Association, American Hospital Association and others have appealed to the FTC to categorize licensed health care professionals the same as attorneys  No response yet from the FTC  Do not assume not covered

2010 © Apgar & Associates, LLC6 Red Flags Rule Overview  Requires implementation of an identity theft protection program which includes:  Risk analysis  Identification of “red flags” (events that may be identity theft)  “Red Flag” alerts  Response policies, procedures and practices (similar to a security incident response team)  Annual program review and update as necessary

2010 © Apgar & Associates, LLC7 Federal & State Breach Notification Laws  Oregon breach notification requirements effective October 1, 2007  State security requirements effective January 1, 2008 (non-HIPAA and GLBA covered entities)  Federal interim final breach notification rule and breach notification requirements effective September 23, 2009  Penalties associated with non-compliance with state and federal breach notification laws

2010 © Apgar & Associates, LLC8 Federal & State Breach Notification Laws  Existing requirements dovetail with Red Flags Rule and HIPAA Security Rule  Identity theft protection program is preventative versus breach notification which is reactive  Preventive and reactive policies, procedures and practices are already mandated by the HIPAA Security Rule (covered entities and business associates)

2010 © Apgar & Associates, LLC9 Federal & State Breach Notification Laws  “Red Flags” could represent security breaches  Breach notification requirements would be triggered under Oregon and federal law  Now required to notify patients of medical information breach  Tied to HIPAA Security Rule requirement, security incident response mitigation phase and HIPAA Privacy Rule, privacy incident mitigation

2010 © Apgar & Associates, LLC10 Definition of Red Flags  “Red Flags” identify when breach or identity theft might have occurred or may be occurring  Red flags include (list not inclusive):  Notification of fraud from consumer protection agency  Documents provided for identification appear to have been altered or forged  The address or telephone number provided is the same as or similar to the address or telephone number submitted by other patients

2010 © Apgar & Associates, LLC11 Definition of Red Flags  Red flags include (list not inclusive):  Personal identifying information provided is not consistent with personal identifying information on file  Mail sent to the patient is returned repeatedly as undeliverable although health care charges continue to be added to the patient’s account  The clinic or physician is notified by a patient, a victim of medical identity theft, a law enforcement authority or any other person that a person engaged in identity theft or medical identity theft is seeking treatment

2010 © Apgar & Associates, LLC12 Identity Theft Protection Program Requirements  The Red Flags Rule requirements similar to HIPAA Security Rule and federal/state breach notification requirements  Federal and state breach notification requirements are reactive –requires notification after the breach  The Red Flags Rule is proactive – it requires implementation of appropriate protections before a breach occurs

2010 © Apgar & Associates, LLC13 Identity Theft Protection Program Requirements  The HIPAA Security Rule requires implementation of appropriate administrative, physical and technical safeguards  Security safeguard implementation with ongoing attention to safeguard management is the first step in complying with HIPAA and the Red Flags Rule  Both require a risk analysis which (HIPAA included) should occur when establishing a security program and periodically thereafter

© Apgar & Associates, LLC14 A Formal Security Program Before addressing the additional requirements of the Red Flags Rule a formal security program is required This includes principles and practices as required by HIPAA, Oregon law and appropriate industry standards The program needs to be comprehensive and formal (documented, implemented and regularly monitored) Safeguard implementation and management is directly related to controlling breaches

© Apgar & Associates, LLC15 Risk Assessment Perform regular, periodic risk analyses Identify risks (vulnerabilities & threats) and analyze how big they are (likelihood & impact) Take mitigating steps – implement or strengthen existing controls: Administrative Physical Technical

2010 © Apgar & Associates, LLC16 Audit Log Review Capture logs of activity on network, applications and systems, review and document review Looking for unauthorized and authorized users (e.g., excessive or inappropriate access) Routine, timely review of logs can detect breach After breach, logs can reveal what happened and sometimes identify perpetrator Documentation required

© Apgar & Associates, LLC17 Workforce Awareness and Training New workforce training Routine, periodic training for full workforce Includes training for temporaries, volunteers and contractors (non-business associates) Responsibilities regarding privacy and security which includes requirement to report a suspected incident Periodic security and sanctions reminder Targeted training for certain workforce members (e.g., billing, HIM, IT, etc.)

© Apgar & Associates, LLC18 Identity Theft Protection Program Requirements The Red Flags Rule requires physicians and clinics implement an effective identity and medical identity theft prevention program that becomes a part of the formal security program The rule also requires implementation of a program to identify or “flag” identity or medical identity theft as it is occurring to stop it, preventing damage to the patient (medical and financial)

© Apgar & Associates, LLC19 Policy Development Creditors (in this case physicians) are required to develop, implement and periodically update policies and procedures that fully define identity theft protection program Policies and procedures need to address existing and new patient accounts

© Apgar & Associates, LLC20 Policy Development Policies and procedures need to include: How to identify relevant red flags. How to detect red flags. How to respond when red flags are detected Provide for appropriate responses to red flags that matches the risk identified Consider factors such as security breach and subsequent breach notification requirements

© Apgar & Associates, LLC21 Policy Development Policies must: Be approved by the physician, partnership or board (highest authority for the practice) Be overseen by senior management Include staff training and oversight of business associates such as billing agencies

© Apgar & Associates, LLC22 Implementation Need to create process/procedural guidance for each operational area (written or electronic instruction guide) Need to balance risks with appropriate action, by operational area (e.g., higher risk in billing department and patient intake, especially with new patients)

© Apgar & Associates, LLC23 Program Maintenance and Administration The board of directors or senior management need to regularly: Monitor assignment of specific responsibility for program implementation Review reports by workforce members Review or delegate review of audit logs, identified red flags, etc. Approve material changes to program

© Apgar & Associates, LLC24 Program Maintenance and Administration Review and document at least annually: Policy effectiveness Business associate responsibilities and adherence to requirements Reasonably ensuring (e.g., by written contract) business associates: Implementation and monitoring of activities in connection with patient records and accounts Maintain procedures to detect, prevent, and mitigate identity theft

© Apgar & Associates, LLC25 Program Maintenance and Administration Review and document at least annually (continued): Significant security incidents Recommendations for material changes Documentation needs to be retained for a minimum of six years (HIPAA requirement)

© Apgar & Associates, LLC26 Example Program Requirement Develop and implement a policy and procedure that defines the process for patient requests for address changes This includes documentation of appropriate actions for handling address changes and/or patient account changes

© Apgar & Associates, LLC27 HIPAA and Red Flag Rule Reminder The HIPAA Security Rule requires implementation of appropriate administrative, physical and technical safeguards for electronic records The HIPAA Privacy Rule expands security protections to all PHI, no matter the form Breach notification, a federal and a state law requirement, is considered a part of the HIPAA required formation of a security incident response team (SIRT)

© Apgar & Associates, LLC28 Implementation Tips Consider compliance with the Red Flags Rule as an extension of already required compliance with HIPAA and state and federal breach notification requirements “Flags” will be determined more often by how payables and receivables are managed, how new patients are added to the practice and the management of existing patients’ financial and demographic information

© Apgar & Associates, LLC29 Implementation Tips Build on already existing security program – no need to start from scratch Make sure training material is updated to include how identity theft or medical identity theft will be spotted and what actions need to be taken Expand HIPAA required risk analysis to include the additional risk analysis requirements of the Red Flags Rule

© Apgar & Associates, LLC30 Implementation Tips Expand existing policies and procedures where applicable rather than creating new “red flag” policies and procedures Make sure that business associates know what they will now be required to do and amend business associate contracts accordingly (especially billing agencies) If holes exist in the physician or practice’s security program, now is the time to fix them

© Apgar & Associates, LLC31 Resources Federal Trade Commission Alert: /alt050.shtm /alt050.shtm LexisNexis: INARRFWEBPOSTMKTG169?gclid=CPvXzfzA0JgCFQ 9JagodtgL32w INARRFWEBPOSTMKTG169?gclid=CPvXzfzA0JgCFQ 9JagodtgL32w DCIG: issues-red-flag-rules-reminder-ensuring-i.htmlhttp:// issues-red-flag-rules-reminder-ensuring-i.html

© Apgar & Associates, LLC32 Resources Identity Theft Daily: /Latest/Red-Flag-Rules-Effective- November html /Latest/Red-Flag-Rules-Effective- November html Jones Day (law firm): ?pubID=S ?pubID=S5427 Office for Civil Rights:

Summary and Q&A 2010 © Apgar & Associates, LLC 33 Chris Apgar, CISSP President Officially endorsed by the Oregon Medical Association with member discounts available Check out Web site for additional information