Wireless Access Code: 9166703926. July 21, 2002  General medical ID theft education is lacking – over 1.4 million fraud victims in 2010.  Fraud can.

Slides:



Advertisements
Similar presentations
A Do-It Yourself Guide (Sort of…) Veritas Solutions Group, LLC
Advertisements

Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flag Rules: What they are? & What you need to do
© Chery F. Kendrick & Kendrick Technical Services.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
Health Coverage in Retirement Presentation at Citizens’ Health Care Working Group by Gerry Smolka, Senior Policy Advisor AARP Public Policy Institute July.
What is the marketplace? Preventive care Hospitals Physicians Prescription drugs Mental health Rehabilitation Habilitation services Substance abuse Dental.
What Can YOU Do to Help Prevent Healthcare Fraud? Sponsored by: Idaho Commission on Aging Senior Medicare Patrol Program Presented by: (Presenter name,
2 HIPAA, HITECH, and Medical Records. Learning Outcomes When you finish this chapter, you will be able to: 2.1Discuss the importance of medical records.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
What Can YOU Do to Prevent Healthcare Fraud? Funded by: This project is supported in part by grant numbers 90MP0026 and 90MP0127 from the U.S. Administration.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
Return to KaiserEDU Tutorials
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
August 21-24, 2007 Privacy and Security Leaders as Partners in Patient-Centered Care Presented by Samuel P. Jenkins, FACHE Director, Defense Privacy Office.
The Patient Protection and Affordable Care Act [PPACA = ACA] ASAP Meeting Austin, Texas July 22, 2010 Norman H. Chenven CEO & Founder Austin Regional Clinic.
Sharing Low-Income Customer Information Water & Energy Utilities LIOB Meeting - January 2009 Seaneen M Wilson Division of Water & Audits.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
The Affordable Care Act Early Impacts. The main provisions of the law do not launch until However, a lot of change has taken place. Dependent Coverage:
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Cleanup.
National e-Prescribing Conference Sponsored by CMS and Industry Partners - October 6 & 7, 2008 Florida Agency for Health Care Administration Florida Center.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
CORPORATE COMPLIANCE PROGRAM The Office of Corporate Integrity
Florida Information Protection Act of 2014 (FIPA).
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
The Patient Protection and Affordable Care Act Our Healthcare Reform Law Why do we need it? What does it do for us?
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
©SHRM 2008SHRM Poll September 2, From the HR perspective, what aspect of health care policy should be the priority of the next U.S. President and.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
The Best Identity Protection
The Privacy Symposium – Summer 2008 Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach © Aug 2007.
Dennis & Patten Participation in Government Mepham High School Health Care Reform in America.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
HIPAA/HITECH TRAINING. Why are we here?  HIPAA  HITECH  PHI  Minimum Necessary “Need to Know”  Breaches and Fines.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
Combating The Privacy Crime That Can Kill
Combating Identity Fraud In A Virtual World
Tips to Prevent Medicare Fraud
10 Patient Confidentiality and HIPAA
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Skills for Independent Living: Volume III - Health
HEALTH CARE POLICY.
FRAUD, WASTE, & ABUSE (FWA) 2012
SHARING CLINICAL DATA: Legal and Privacy Issues
JEFFERSON CHAMBER OF COMMERCE HEALTHCARE CONFERENCE
Red Flags Rule An Introduction County College of Morris
Protecting Yourself from Fraud including Identity Theft
Introduction to Health Privacy
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Wireless Access Code:

July 21, 2002

 General medical ID theft education is lacking – over 1.4 million fraud victims in  Fraud can result in physical harm to consumers and significantly increases costs for public health care and private insurance.  Healthcare data breaches are on the rise and will continue with adoption of EMR technology.  Credit monitoring is different than health care data monitoring – there are alternative solutions and protections when it concerns personal healthcare data.  New organizations to meet the new security challenge - specialize in health care data breach remediation, medical ID alerts and data recovery.

 The Privacy Rights Clearinghouse recorded 690 breaches involving 23 million records from health care providers. Since 2005  A Harris poll shows that only 15% of US adults are familiar with the term “Medical Identity Theft”. Ponemon Institute Survey, 2011  Costs do decrease with education and proactive prevention. A 2012 Javelin study of financial service providers reported that identity fraud costs dropped by 44% (since 2004) as a result of early detection and expedited tracking programs.

 Alters medical history such as blood type, pre-existing conditions, prescription history, allergies, etc.  Limits ability to obtain insurance and fair insurance rates.  Treatments are limited or denied because insurance benefits are maxed out.  Denied life insurance due to inaccurate medical records. 3 Click Solutions July 21, 20025

 Increases state Medicaid FFS budgets - public health service programs are billed for treatments, prescriptions and services that were never rendered.  Adoption of digital health record technology in public health services invites a new type of criminal to the Medicaid arena (data recovery). 3 Click Solutions July 21, 20026

 Increases the cost of private insurance due to multiple people using one policy and making numerous claims.  Self insured employers won’t be able to afford employee plans & will look to government programs to cover health care costs. 3 Click Solutions July 21, 20027

1 Updated privacy requirements for MMIS system contractors and fiscal agents; and, strict review of HIE and HIX privacy and security compliance and data recovery. 2 Identify systems/technology that proactively identify fraud. 3 Educate consumers/patients of the importance of looking at their Explanation Of Benefits (EOB) statements or electronic EOB alerts to help protect their identity and flag potential fraud. 4 Require entities that experience breaches in medical identities to offer medical identity monitoring not credit monitoring. Credit observation is supplemental but does not address the primary challenges of medical ID fraud. Create standards for data recovery vendors. 8

Kymberly Messersmith, State Affairs Patrick Murphy, Federal Affairs Follow us on or Kymber3CS Follow us on 3-Click-Solutions 3 Click Solutions July 21,

Wireless Access Code: