R ed F lag R ule Training for the Veterinary Industry © Chery F. Kendrick & Kendrick Technical Services.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
© Chery F. Kendrick & Kendrick Technical Services.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Springfield Technical Community College Security Awareness Training.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
Protecting Personal Information Guidance for Business.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Presented By Drexel and FMFCU.
Identity Theft Solutions. ©SHRM Introduction Identification theft became the number one criminal activity issue in 2004 and has remained at the.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Preventing Mail Theft Presented by American Crime Prevention Institute.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
 Federal Trade Commission (FTC)  Final Regulations issued November, 2007 › Effective 1/1/08 › Compliance and Enforcement Date 11/1/08  Enforcement.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Presented By The Plano Police Department Crime Prevention Unit.
© Chery F. Kendrick & Kendrick Technical Services.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
What You Need to Know Customer Service 1 08/09/2012.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Protecting your money: Identity Theft
© Chery F. Kendrick & Kendrick Technical Services.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
© 2003 SHRM SHRM Weekly Online Poll: March 9, 2004 QOTW - Identity Theft Analyzing 340 responses of s sent, 1628 received (response rate = 20.9%).
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
© Chery F. Kendrick & Kendrick Technical Services, LLC.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity theft: Real or Virtual? By: Alex Metzler.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Be Cautious of Identity Theft By: Sydney Langley.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Identity Theft.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
By: Asfa Khan and Huda Mukhtar
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Presented By Plano Police Department Crime Prevention Unit.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Federal Trade Commission's List of Top 10 Consumer Scams in 2013 By: Austin Warren
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
1 Identity Theft Prevention and the Red Flag Rules.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Identity Theft How bad people get good credit. Lindsey Bertugli.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
Protecting Your Credit Identity
When you get caught for Identity Theft
Protecting Personal Information Guidance for Business.
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Your Credit Identity
Protecting Your Identity
Getting the Green Light on the Red Flags Rule
Identity Theft and Credit Safety
Presentation transcript:

R ed F lag R ule Training for the Veterinary Industry © Chery F. Kendrick & Kendrick Technical Services

What is the Red Flag Rule? The Red Flag Rule is a relatively new rule developed by the FTC (Federal Trade Commission) to help prevent identify theft and credit card fraud © Chery F. Kendrick & Kendrick Technical Services

Does this apply to you? YES! The FTC ruled that members of the veterinary team must comply. The Red Flag Rule © Chery F. Kendrick & Kendrick Technical Services

It’s not HIPAA- the RFR protects financial information not medical info Specifically for protection of consumers (that would be our clients) from identity theft HIPAA policies can overlap with the RFR in terms of identity protection (such as Social Security Numbers) Isn’t This The HIPAA Rule?? No, this is a cat of different stripes © Chery F. Kendrick & Kendrick Technical Services

So, let’s get started © Chery F. Kendrick & Kendrick Technical Services

Risk Assessment Checklist Your Practice Manager has created a “Risk Assessment Checklist” Let’s work through the checklist © Chery F. Kendrick & Kendrick Technical Services

Potential Red Flags Gathering information on forms that extend credit for veterinary care. Client information for pet health insurance forms. Accepting credit card payments by phone or mail on written-in forms. Accepting credit card payments at the front desk upon checkout. © Chery F. Kendrick & Kendrick Technical Services

Potential Red Flags Continued Accepting checks and obtaining personal info, such as SSN and driver’s license number. Forms completed by clients for veterinary service. © Chery F. Kendrick & Kendrick Technical Services

Steps to Take Don’t leave files on counters where public has access Keep file cabinets secured © Chery F. Kendrick & Kendrick Technical Services

More Steps to Take Take private information by phone out of public’s earshot © Chery F. Kendrick & Kendrick Technical Services

Computer Access Secure client information by logging in/out before leaving terminal Protect Your Password!! © Chery F. Kendrick & Kendrick Technical Services

Credit Card Safety Match name on credit card to driver’s license or other form of picture ID Hand credit card back directly to the client you received it from Do NOT lay credit cards down on desk or counter © Chery F. Kendrick & Kendrick Technical Services

Checks Match name on check to driver’s license or other form of picture ID Immediately secure checks in locked drawer When you are preparing deposit slips do so in private © Chery F. Kendrick & Kendrick Technical Services

Beware of what you put in the trash un-shredded. Thieves use contents of trash containers to steal identities. Shred all messages or notes with information about personal records such as addresses, and billing info. Don’t forget electronic media: shred discs, clear out files before disposing of computer. The Importance of Shredding © Chery F. Kendrick & Kendrick Technical Services

1) Guard personal information collected 2) Carefully handle credit cards 3) Secure personal checks 4) Log in/out of computers 5) Guard passwords Summary © Chery F. Kendrick & Kendrick Technical Services

Now you have completed your training to help stop identity theft © Chery F. Kendrick & Kendrick Technical Services

Call “Doc Chery” Dr. Chery F. Kendrick Veterinarian & Regulatory Specialist Kendrick Technical Services Questions? © Chery F. Kendrick & Kendrick Technical Services

Dr. Chery F. Kendrick Veterinary Regulatory Specialist Kendrick Technical Services © Chery F. Kendrick & Kendrick Technical Services