UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.

Slides:



Advertisements
Similar presentations
Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Advertisements

Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Identity Theft Prevention Program Red Flags Rules Fighting Fraud at Montana Tech.
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Identity Fraud Prevention 1 Copyright Identity Management Institute®
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
The Red Flag Rule and Medical Identity Theft Prevention Program
The Minnesota State Colleges and Universities system is an Equal Opportunity employer and educator. The Red Flag Rule Detecting, Preventing, and Mitigating.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
1 The FACT Act – An Overview The FACT Act An Overview of the Final Rulemaking on Identity Theft Red Flags and Address Discrepancies Naomi Lefkovitz Attorney,
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
Financial Data Protection and Consumer Notification of Data Security Breach Act of 2006 Sara Juster, JD Vice President/Corporate Compliance Officer Nebraska.
Basic Banking Services - Activity 1
© Chery F. Kendrick & Kendrick Technical Services.
Detecting, Preventing, and Mitigating Identity Theft
© Chery F. Kendrick & Kendrick Technical Services.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
© Chery F. Kendrick & Kendrick Technical Services, LLC.
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Immigration and Hiring
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/10/2015 FACTA Red Flags.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
UNC Asheville Red Flag Rule and NC Identity Protection Act Information.
Red Flag Rules: Identity Theft Protection.
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains audio, so please adjust your volume and sound settings at this time.

Objectives  Overview Red Flag Rule  Definitions  Identification of possible red flags  UAMS Policy and Procedures  Verification Assistant  Adding Critical Alerts

Program Adoption  Identity theft is the fastest growing crime in the United States It affected more than 10 million Americans in A new victim every 2 seconds.  Federal Trade Commission Red Flag Rule  Fair and Accurate Credit Transactions Act of 2003: Section 113

Program Purpose  To protect UAMS patients and students from the risk of identity theft ID Theft/Red Flag Rule program contains policies and procedures to: 1. Identify relevant Red Flags for new and existing covered accounts and incorporate those Red Flags into the Program; 2. Detect Red Flags that have been incorporated into the Program; 3. Respond appropriately to any Red Flags that are detected to prevent and mitigate Identity Theft; and 4. Ensure the Program is updated periodically, to reflect changes in risks to customers or to the safety and soundness of the creditor from Identity Theft.

Enforcement Deadline  Program must be in place by June 1, 2010  Entities failing to comply with the Red Flag Rule could face enforcement actions by the FTC, which is authorized to seek up to $2,500 in penalties for each independent violation of the rule  Enforcement actions by state attorneys general, which are authorized to recover up to $1,000 for each violation (plus attorney’s fees) on behalf of their residents

Definitions  Identity Theft Fraud committed using the identifying information of another person.  Medical Identity Theft Medical identity theft occurs when someone uses a person’s name and sometimes other parts of their identity (e.g. insurance information or Social Security number) without the person’s consent to obtain medical services or goods, or uses the person’s identity information to make false claims for medical services or goods.

Definitions  Covered Account Any account UAMS offers or maintains that involves multiple payments or transactions, or for which there a foreseeable risk of Identity Theft.  Red Flag A pattern, practice, or specific activity that indicates the possible existence of Identity Theft.  Identifying Information Any name or number that may be used, alone or in conjunction with any other information, to identify a specific person.

Medical Identity Theft  Healthcare effects Medical record may be polluted with potentially life threatening misinformation Patients may:  Receive the wrong medical treatment or delayed medical treatment from inaccurate diagnosis  Find their health insurance exhausted  Fail physical exams for employment due to erroneous disease entries in their health record

Identifying Information  name  address  telephone number  social security number  date of birth  government issued driver’s license or ID number  alien registration number  government passport number  employer or taxpayer identification number  unique electronic identification number  computer’s Internet Protocol address or routing code

Detection of Red Flags  Verify Patient’s Identity UAMS Policy on identity theft states that registration personnel will obtain and verify the identity of all patients to the extent possible. Pharmacy, clinical, billing, and Health Information Management (HIM) personnel also have specific patient verification processes.

Registration Procedure I and II I. All adult patients will be asked for photo identification. II. Minor patients’ parent/guardian will be asked for photo identification. Examples include state issued drivers license, state issued ID card, military ID, passport, etc.

Registration Procedure III III. The photo identification will be scanned into the patient account. An adult patient’s photo ID should be scanned into EPF folder “Drivers License” even if it’s a state ID card. An adult guarantor’s photo ID should be scanned into EPF folder “Drivers License” their own CPI #, not the patient’s.

Registration Procedure IV IV. In the event the patient does not have a photo ID, ask for two forms of non- photo ID, one of which has been issued by a state or federal agency. Examples include a Social Security Card, utility bill, or company/school ID. Scan the IDs into the “Drivers License” EPF folder.

Registration Procedure V V. Any patient who is unable to provide photo identification will have their Social Security Number verified in the hospital electronic verification system. No one should be refused care because they do not have acceptable ID with them. The patient should be asked to bring appropriate ID to their next visit.

Verification Assistant

Verification Assistant Screen 1

Response Screen 1

Response Screen 2

Partial Response Screen

Responding to Questions  Patient: “Why am I being asked for ID?”  Registration Personnel: “We ask for your photo ID to protect our patients from identity theft. Because of that, we are now using the same processes used in the community to cash a check, make a large credit card purchase, or board a plane.”

Responding to Red Flags  If any employee believes potential identity theft has occurred, the account should be flagged immediately and details should be documented in CPI comments.  The supervisor should be notified.  Investigation and follow-up will be conducted by the hospital privacy officer.  Registration personnel may be contacted for additional information during this period.  Hospital bills will be suspended until investigation and follow-up have been completed.

Registration Procedure VI VI. The appropriate identity theft flag in the ADT system will be set as follows: a. DR—Duplicate Record—alert that records of two patients may be co-mingled such as two patients with same identifying information. b. ID—Identity Theft Victim – alert that this is a confirmed case of identity theft. c. NA—Notice of Activity—alert that some source has notified UAMS of possible ID theft. The source may be the patient, the patient’s credit agency, law enforcement or any other source. d. SA—Suspicious Activity—will alert that there are suspicious documents or clinical inconsistencies present.

Registration System ID Flags

Critical Alert Field

Critical Alert Table

Person Information I Screen

Registration Workstation Screens

Registration Policies VII and VIII VII. Emergency care will not be delayed for lack of ID VIII. Any unresolved Identity Theft Flags noted at point of registration should be reported to supervisor or manager for follow up.

Signs of Possible Identity Theft  Suspicious personally identifying information: Patient appears and gives an identity that has been flagged. Patient provides a photo ID that does not match the patient Patient gives a SSN different than one used on a previous visit or is the same as another patient account Patient gives information that conflicts with information in his/her file Family member/friend calls the patient by a different name than that provided at the time of registration.

Signs of Possible Identity Theft  Suspicious documents Identification documents appear to have been altered or forged Other information is inconsistent with readily accessible information on file such as a signature mismatch  Unusual use of or suspicious activity related to a covered account For example mail sent to the customer is returned repeatedly as undeliverable although recent business activity reflects the address in question

Signs of Possible Identity Theft  Alerts, notifications, or warnings from a patient, student, victim, law enforcement, consumer reporting agency, or other institution or business

Contact Information  Revenue Integrity Specialist Team Hotline: RevenueIntegritySpecialist-  Vera Chenault, J.D., UAMS Identity Theft Prevention Program Administrator Office:

Certificate of Completion  Please RIST for your certificate of completion. Add the text “Red Flag Rule” to the subject line.