IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.

Slides:



Advertisements
Similar presentations
The Regulatory Perspective
Advertisements

Red-Flag Identity Theft Requirements February 19th 2009 Cathy Casagrande, Privacy Officer.
Fair Credit Reporting Act You must be told if information in your file has been used against you You can find out what is in your file You can dispute.
UNDERSTANDING RED FLAG REGULATIONS AND ENSURING COMPLIANCE University of Washington Red Flag Rules Protecting Against Identity Fraud.
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Compliance with Federal Trade Commission’s “Red Flag Rule”
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Red Flag Rules: What they are? & What you need to do
Red Flag Identity Theft Training California State University, Fullerton Campus Information Technology Training August 2012.
Changes to HIPAA (as they pertain to records management) Health Information Technology for Economic Clinical Health Act (HITECH) – federal regulation included.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
STAFF TRAINING: UCHC IDENTITY THEFT PREVENTION PROGRAM Upham’s Corner Health Committee, Inc. DBA Upham’s Corner Health Center Upham’s Elder Service Plan.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1 Red Flags Rule: Implementing an Identity Theft Prevention Program Health Managers Network May Chris Apgar, CISSP President, Apgar & Associates,
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
University of Minnesota Identity Theft Prevention Program: Red Flags Rule Detecting, Preventing, and Mitigating Identity Theft This presentation was adapted.
© 2008 Smith Moore Leatherwood LLP. ALL RIGHTS RESERVED. Raising a “Red Flag”: Understanding the Fair and Accurate Credit Transactions Act, the “Red Flag”
Identity Theft and Red Flag Rules Training Module The University of Texas at Tyler.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Network security policy: best practices
© Chery F. Kendrick & Kendrick Technical Services.
UAMS Identity Theft Program—Red Flag Rule Computer Based Training (CBT) Module Prepared for UAMS Registration and Admissions Personnel Each slide contains.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
NORTH AMERICAN SAFETY CHECKLIST – SB 158. Rhonda Anderson, RHIA President Anderson Health Information Systems, Inc. Presented By:
Copyright 2007, Integrated Compliance Solutions, LLC FACT Act Red Flags Bank Compliance Association of Connecticut September 3, 2008 Copyright 2007, Integrated.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
2015 ANNUAL TRAINING By: Denise Goff
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Red Flag Rules Training Class SD 428. Red Flag Rules SD 428 The Red Flag Rules course (SD 428) was implemented at UTSA to meet the requirements and guidelines.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Risk Management, Assessment and Planning Committee III-4.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
HIPAA BASIC TRAINING MODULE 1C – Overview (For staff who do not generally create Protected Health Information) Anderson Health Information Systems, Inc.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Health Information and Administrative Policy Updates Presented by Lizeth Flores, RHIT Anderson Health Information Systems Inc
World Bank International Standards and their Measures for Financial Institutions and Non-Financial Businesses and Professions to Prevent Money Laundering.
Office of Human Research Protection Georgia Health Sciences University.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
1 Identity Theft Prevention and the Red Flag Rules.
Red Flags Rule Red Flags Rule Staff Training Course Practice Administrator SAMPLE AAP PEDIATRICS.
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
HIPAA Update J. T. Ash University of Hawaii System
Red Flags Rule An Introduction County College of Morris
Disability Services Agencies Briefing On HIPAA
County HIPAA Review All Rights Reserved 2002.
Identity Theft Prevention Program Training
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
Clemson University Red Flags Rule Training
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Getting the Green Light on the Red Flags Rule
Presentation transcript:

IDENTITY THEFT

RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.

 Facility will:  Have a ”Red Flag” identity theft prevention and compliance program to prevent and mitigate identity theft  Identify and monitor red flags that may indicate theft of information about a resident that could be used for medical identity theft  Respond to any red flags that may indicate possible identity theft on a case by case basis

 Facility will:  Have a system for the Administrator and the Quality Assurance/Continuous Quality Improvement Committee to approve the identity theft prevention and compliance program;  Periodically but no less than annually, review compliance, effectiveness, incidents, actions and recommendations for revisions of the program.

 Staff involved in the identity theft prevention program will be trained on identification and detection of “red flags” during orientation and job specific training as applicable.

 The facility will include red flag procedures in training of all applicable personnel.  Best practice for electronic records  The facility may have flag or alert when changes that are a warning and “flashes – red flag warning or similar statement” that alerts to the data that would be considered as high risk for medical theft and integrity. This “Red Flag” warning will alert the user of the need for further authentication.

 Identify facility employees who are authorized to make changes to residents demographic information; these individuals will be responsible for the identifying “red flags”  Business office  Medical records  Social services

 Facility staff will forward any requested changes to employees authorized to make changes, i.e., anyone bringing a change of address to nursing staff or other key identification information will be referred to employees who are charged with assuring identification, insurance information, etc. are confirmed.

 Five types of “red flags” personnel for oversight of the identity theft program should be familiar with:  Alerts or warnings received from consumer reporting agencies  Presentation of suspicious documents  Presentation of any suspicious personal identifying information  Suspicious activity related to covered accounts

 Five types of “red flags” personnel for oversight of the identity theft program should be familiar with:  Any notices received from identify theft victims, law enforcement agencies, or other parties containing information related to identity theft as to covered accounts

 Authenticate the following information:  Suspicious documents  Name changes  Social Security number changes  Medicare/Medicaid number changes  Health Maintenance Organizations (HMOs), Insurances, MediCal/Medicare, Prescription Drug Program (PDP) and Name of PDP changes  Identity theft report by victims, law enforcement agencies or other parties.

 In the event of any of the above, the facility will request further verification of information such as verification with appropriate identification documents drivers license, other verification information, addresses, Social Security Administration, HMO company etc.

 A person or entity that performs an activity in connection with a covered account on behalf of the facility.  Examples: collection agencies, billing companies is considered a service provider

 Service providers will be contractually obligated to take reasonable steps to detect, prevent, and mitigate the risk of identity theft of covered accounts.  Any identified Red Flags will be reported to the facility for further appropriate action as per facility policy.