AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL

Size: px
Start display at page:

Download "AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL"

Transcription

1 AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL

2 Disclosure of Conflict of Interest This presenter has no significant financial interest/arrangement with any organization that could be perceived as a real or apparent conflict of interest with the subject matter of the presentation.

3 OBJECTIVES Identify the methods of obtaining personal information used to perpetrate medical identity theft. Discuss impact of medical identity theft. Apply preventive measures and techniques to reduce the risk of medical identity theft.

4 Medical Identity Theft Medical identity theft occurs when someone uses an individual s name and personal identifying information to fraudulently receive medical services, prescription drugs and/or goods, including attempts to commit fraudulent billing.

5 Comparison Regular ID Theft Financial crime Goal to make money Medical ID Theft Information crime Goal is frequently to get services or drugs Can happen in a healthcare Usually only happens in a institution healthcare institution or office using medical data Results in a loss of money Can result in financial loss, as well as, loss of life and/or medical benefits Victim usually finds out fairly Victim may not know for a long quickly time

6 Some Statistics You Should Know Medical ID theft has increased nearly 22% over the past year Medical ID theft increased from 3% to over 5% of all ID theft 2.4 millions victims of medical ID theft in 2014 Nearly 60% of victims know the suspect 60% of patients never review medical records for accuracy

7 Some Statistics You Should Know Average cost of medical bills = $23,346 Average cost to correct = $13,500 Estimated over $56 billion in cost to victims of medical ID theft Fraudulent billing is most common form of ID theft within Medicare and Medicaid Stolen or lost electronic devices are a large source of information for thieves

8 Some Statistics You Should Know Healthcare workers are most common source of theft within hospitals Only 40% of medical ID theft incidences are reported to law enforcement Average victims spends more than a year trying to correct medical ID theft and only 10% of incidences get fully corrected 80% of organizations responsible for maintaining medical records have reported data breaches

9 VICTIM PROFILE 30% have employer-based health insurance and 23% are Medicare/Medicaid 51% have higher education, college or above 50% full time employment and 13% part time employment 52% had reported income below $50,000 with and overall average income of $69,500 3 highest geographic regions Northeast (19%), Mid-Atlantic (18%), and the Midwest (18%).

10 TYPES OF MEDICAL IDENTITY THEFT Shared information. Intentionally provide information to a friend or family member due to no insurance or lack of adequate insurance coverage out of need for medical treatment.

11 TYPES OF MEDICAL IDENTITY THEFT Stealing someone else s information. Steal information through various means; data breach, phishing, mail theft, trash, electronic devices, wallet, ect, used to either receive services or obtain prescriptions for controlled substances.

12 TYPES OF MEDICAL IDENTITY THEFT Altering own information. Change your own information by altering spelling of name, DOB, SSN, address, and insurance policy numbers, most commonly done to obtain prescriptions for controlled substances.

13 TYPES OF MEDICAL IDENTITY THEFT Create fake Information. Simply create fake identity by creating a name, DOB, SSN, and insurance card most commonly done in order to obtain prescriptions for controlled substances.

14 TYPES OF MEDICAL IDENTITY THEFT Fraudulent billing. Billing for services never rendered or up-coding services to a higher billing code in order to collect higher payments, also perpetrated by organized crime groups to collect money.

15 TYPES OF MEDICAL IDENTITY THEFT Professional Identity Theft. Stealing identity of medical professionals to include name, business address, DEA number, and prescription pad format, most commonly in order to obtain controlled substances.

16 RISKS OF MEDICAL IDENTITY THEFT Improper medical information. Record could include wrong blood type and medication allergies which could have deadly consequences. Record could also included diagnosis such as mental illness which could have far reaching and damaging effects that could follow you throughout life. Improper medical information throughout entire network and electronic records database.

17 RISKS OF MEDICAL IDENTITY THEFT Loss or denial of benefits. Cancellation of insurance, maximum benefit caps, and denial of life insurance due to information contained in medical record. Professionals may not receive payment for services rendered to ID thieves.

18 RISKS OF MEDICAL IDENTITY THEFT Miss or missed diagnosis on the basis of the wrong information. Professionals could potentially overlook initial diagnosis information due to medical records indicating procedures having already been completed such as appendix or gall bladder removed causing delays and possibly wrong treatment.

19 RISKS OF MEDICAL IDENTITY THEFT Financial loss due to unpaid medical bills. In addition to the unpaid medical bills victims face issues with bill collectors, loan or mortgage denials, higher interest rates, higher insurance rates, lose of employment or denial of employment opportunities, and wage garnishment. Providers potentially never paid or having to return payments that were made for services.

20 RISKS OF MEDICAL IDENTITY THEFT Loss or damage to reputation. Employer-based insurance, where information is given to employer. Embarrassment due to the disclosure of sensitive personal health conditions. Professions reputation damaged due to loss of confidence in provider by patients.

21 RISKS OF MEDICAL IDENTITY THEFT Legal issues. Subpoenas for medical records in defense of cases. Failed drug tests by ID thieves resulting in legal issues for victims. Professionals being sued by victims for breaches of medical information and face sanctions or fines from government or regulatory bodies.

22 RISKS OF MEDICAL IDENTITY THEFT Loss of time. Victims could spend months even years to try to get medical records corrected. Professionals could face sanctions or scrutiny from licensure and other regulatory bodies.

23 WHY MEDICAL IDENTITY THEFT Desperation, need, or necessity Personal use or personal gain Pressure from friends, family, or significant other Love triangles Revenge

24 WHY MEDICAL IDENTITY THEFT Disgruntled employees Malicious actions Blackmail financial gain Just for fun or the challenge

25 POTENTIAL PERPETRATORS Friends and family Neighbors Drug addicts Contract workers Entry level employees Temp staff or staffing services

26 POTENTIAL PERPETRATORS Cleaning service staff Drug dealers Organized crime groups Medical professionals Hackers

27 PREVENTIVE MEASURES Record and monitor access to systems. Restrict personal cell phone and camera use by employees. Strong information technology restrictions. Written medical identity theft policy and response plan. Establish monitoring of records for red flags. Sequestering method for incorrect information

28 PREVENTIVE MEASURES Trust your instincts. Check identification, make sure it matches. (Photocopy license or ID card) Examine documents that are presented. Complete detailed intake sheet for every visit. (Currently seeing any doctors or taking any medications?) Do not provide any information to patient. (Address, DOB, SSN, leading questions)

29 PREVENTIVE MEASURES Take photo of patient or have video in clinic. Document identifying characteristics. (Scars, marks, tattoos, unique physical characteristics) Check with previous doctors. Check within your network and other networks. Check with pharmacy. (e.g., Walgreens, CVS, Wal-Mart, Target, Shopko, Bakers) Background check of employees.

30 PREVENTIVE MEASURES Report suspicious patients and incidents. Examine explanation of benefits. Monitor insurance benefits. Check credit history. Check medical record. File police report

31 AN OVERVIEW OF MEDICAL IDENTITY THEFT QUESTIONS?

32 Contact Information Investigator C. Kober#346 Nebraska State Patrol 2707 N 108 th Street Omaha, NE (office) (direct) (fax) (cell) (24hr) christopher.kober@nebraska.gov

Consumer Information Sheet 16 October 2013

Consumer Information Sheet 16 October 2013 First Aid For Medical Identity Theft Tips for Consumers Consumer Information Sheet 16 October 201 When another person uses your personal information to get medical services or goods, or to gain financially,

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Integrity We are above reproach in everything we do.

Integrity We are above reproach in everything we do. Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

The High Price of Medical Identity Theft and Fraud

The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar

More information

Third Annual Survey on Medical Identity Theft

Third Annual Survey on Medical Identity Theft Third Annual Survey on Medical Identity Theft Sponsored by Experian s ProtectMyID Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report Part 1:

More information

2013 Survey on Medical Identity Theft

2013 Survey on Medical Identity Theft 2013 Survey on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from ID Experts Independently conducted by Ponemon Institute LLC Publication Date: September 2013 Ponemon

More information

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How

More information

Healthcare Utilizing Trusted Identity Credentials

Healthcare Utilizing Trusted Identity Credentials Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg. ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...

More information

Red Flag Policy and Procedures for Alexander Orthopaedic Associates

Red Flag Policy and Procedures for Alexander Orthopaedic Associates Red Flag Policy and Procedures for Alexander Orthopaedic Associates The Identify Theft Prevention Program developed by Alexander Medical Group LLC dba Alexander Orthopaedic Associates referred throughout

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

More information

Facts About FACTA Red Flag Identity Theft Prevention Program

Facts About FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views

More information

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

Identity Theft Problem and Solutions

Identity Theft Problem and Solutions Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or

More information

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags. Identity Theft Prevention & Detection Red Flags Rule Compliance Policy It is the policy of Kilgore Vision Center to follow all federal and state laws and reporting requirements regarding identity theft.

More information

Protect Yourself From Identity Theft

Protect Yourself From Identity Theft Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social

More information

RANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

RANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009 RANDOLPH COUNTY HEALTH DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Health Department ( the Department

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and

More information

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union

More information

DHHS POLICIES AND PROCEDURES

DHHS POLICIES AND PROCEDURES DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:

More information

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010 Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an

More information

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009 RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services

More information

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Covered Areas: Those EVMS departments that have activities with Covered Accounts. I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES FRANKLIN SQUARE EYE CARE 918 HEMPSTEAD TPKE FRANKLIN SQUARE, NY 11010 TEL #: (516) 354-4242 FAX #: (516) 354-7788 E-mail: franklineyecare@gmail.com OFFICE CONTACT PERSON: SHERIN GEORGE O.D. NOTICE OF PRIVACY

More information

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect

More information

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY: SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED

More information

PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina

PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest

More information

Medicare 101. Presented by Area Agency on Aging 1-A

Medicare 101. Presented by Area Agency on Aging 1-A Medicare 101 Presented by Area Agency on Aging 1-A What is Medicare? n Federal Health Insurance for: n People 65 years of age or older n Some persons with disabilities, after a 24 month waiting period

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

Do s & Don ts Reference website. www.farmersidentityshield.com

Do s & Don ts Reference website. www.farmersidentityshield.com What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What

More information

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;

WHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor; CITY OF STATE OF GEORGIA ORDINANCE NO: AN ORDINANCE TO AMEND THE CODE OF ORDINANCES, CITY OF, GEORGIA TO PROVIDE A NEW ARTICLE, IDENTITY THEFT PREVENTION PROGRAM; TO COMPLY WITH FEDERAL REGULATIONS RELATING

More information

Scope All [Name of Facility] operations

Scope All [Name of Facility] operations Scope All [Name of Facility] operations Purpose To describe the measures to be followed when health care is obtained under a fictitious name or in another person s name. This includes situations when a

More information

Fifth Annual Study on Medical Identity Theft

Fifth Annual Study on Medical Identity Theft Fifth Annual Study on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from: Kaiser Permanente, ID Experts, Experian Data Breach Resolution and Identity Finder, LLC

More information

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation

More information

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...

More information

Appendix 1: Identity Theft Red Flags Mitigation and Resolution Procedures

Appendix 1: Identity Theft Red Flags Mitigation and Resolution Procedures Suspicious Personal Identifying Information Documents provided for identification appear to have been altered or forged. The photo or physical description of the person is not consistent with the appearance

More information

Red Flag Rules and Aging Services: What You Need to Know

Red Flag Rules and Aging Services: What You Need to Know Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement

More information

Prevention is Better than Cure: Protect Your Medical Identity

Prevention is Better than Cure: Protect Your Medical Identity Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical

More information

The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance

The High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Ann Patterson Medical Identity Fraud Alliance Medical Identity Theft Primer Includes theft of Protected

More information

Ouachita Baptist University. Identity Theft Policy and Program

Ouachita Baptist University. Identity Theft Policy and Program Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program

More information

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

Administrative Procedures Memorandum A1452

Administrative Procedures Memorandum A1452 Page 1 of 11 Date of Issue February 2, 2010 Original Date of Issue Subject References February 2, 2010 PRIVACY BREACH PROTOCOL Policy 2197 Management of Personal Information APM 1450 Management of Personal

More information

Medicare Compliance and Fraud, Waste, and Abuse Training

Medicare Compliance and Fraud, Waste, and Abuse Training Medicare Compliance and Fraud, Waste, and Abuse Training Objectives Recognize laws and concepts affecting compliance and fraud, waste, and abuse (FWA) Increase awareness of FWA Use identification techniques

More information

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid

More information

Understanding our requirements and ensuring compliance

Understanding our requirements and ensuring compliance Understanding our requirements and ensuring compliance The FTC = Federal Trade Commission The FTC issued the Red Flag Rule as part of the Fair and Accurate Credit Transaction Act of 2003 (FACT Act), Sections

More information

Advanced Identity Theft - The Big Picture

Advanced Identity Theft - The Big Picture The National Center for Victims of Crime is pleased to provide the slides used in our March 26, 2015 Webinar, Advanced Identity Theft. Please be advised that these materials are provided through the generosity

More information

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself

More information

RC284. Protect Yourself Against Identity Theft

RC284. Protect Yourself Against Identity Theft RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Protecting, Monitoring and Resolving

Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

California State University, Chico. Identity Theft Prevention Red Flags Program

California State University, Chico. Identity Theft Prevention Red Flags Program Identity Theft Prevention Red Flags Program Version 1.0 November 16, 2010 REVIEW/APPROVAL HISTORY Document Title: Author: Brooke F. Banks, Information Security Officer Date By Action Pages 10/30/2009 Bill

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

IDENTITY THEFT PROCEDURES

IDENTITY THEFT PROCEDURES IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the

More information

FTC FACTS for Consumers

FTC FACTS for Consumers ftc.gov FOR THE CONSUMER FTC FACTS for Consumers FEDERAL TRADE COMMISSION 1-877-FTC-HELP Medical Identity Theft C ould identity thieves be using your personal and health insurance information to get medical

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management

Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management The purpose of a Compliance Program is To reduce the risk or error or fraud Designed to ensure

More information

Weber Human Services Identity Theft Prevention Policy

Weber Human Services Identity Theft Prevention Policy Weber Human Services Identity Theft Prevention Policy Purpose: Weber Human Services (WHS) is committed to protecting the privacy of the Protected Health Information ( PHI ) of our clients and the Personal

More information

Identity Theft in Healthcare

Identity Theft in Healthcare Identity Theft in Healthcare Presented by: Donna Gilley, CCP, CHC Wynelle Paige, RHIA, CCP LBMC Healthcare Group, LLC Compliance Advisory Coalition Dgilley@lbmc.com mwpaige@charter.net 615-309-2376 865-621-2095

More information

OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT

OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT Attorney General Derek Schmidt BEING A SMART CONSUMER Jackie Williams, Assistant Attorney General Consumer Protection Division Duties of the Attorney General:

More information

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose

More information

Fraud and Abuse and How it Affects the Coder

Fraud and Abuse and How it Affects the Coder Fraud and Abuse and How it Affects the Coder Presented by: Laura E Hill, CPC, CPC-I, MCS-P What is Fraud? In the simplest terms, fraud occurs when someone knowingly and with intent to defraud, presents

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Implemented October 2009 Page 1 Table of Contents Background... 3 Purpose... 3 Definitions... 3 Pretext Calling... 4 Receiving Telephone Calls... 5 Change of Address...

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

Child Identity Theft Study

Child Identity Theft Study Child Identity Theft Study Conducted by Javelin Strategy & Research October 2008 2008 Javelin Strategy & Research All Rights Reserved Executive Summary Rarely do parents or guardians consider the possibility

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

Red Flag Rules Information and Training

Red Flag Rules Information and Training Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit

More information

S12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente

S12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente S12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita C. Janiga Director,

More information

Do You Know Where the Drugs Are Going? Partners in Integrity

Do You Know Where the Drugs Are Going? Partners in Integrity Do You Know Where the Drugs Are Going? Partners in Integrity Objectives At the conclusion of this presentation, participants will be able to: Identify common types of drug diversion activities. List at

More information

Physician Office Compliance with the Red Flag Rule

Physician Office Compliance with the Red Flag Rule Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician

More information

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009

Identity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009 Identity Theft Prevention Program Approved by the Arizona Board of Regents on May 1, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules

More information

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

Identity Theft. Providing Your Student with a Safety Net By Sun Ow Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial

More information

Identity Theft Simple ways to keep your sensitive information safe.

Identity Theft Simple ways to keep your sensitive information safe. Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

4/13/2016. Safeguarding Your Medical Identity. Learning Objectives. Dr. Peters Tale of Identity Theft. Presentation

4/13/2016. Safeguarding Your Medical Identity. Learning Objectives. Dr. Peters Tale of Identity Theft. Presentation Safeguarding Your Medical Identity Presentation Learning Objectives Describe medical identity theft and the associated problems Recognize the risks for medical identity theft List strategies to mitigate

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do

More information

About the Author. Acknowledgments

About the Author. Acknowledgments About the Author Foreword Preface Acknowledgments xv xvii xix xxiii 1 THE IDENTITY THEFT EXPLOSION 1 What Is Identity Theft? 2 It Is Not Rocket Science 3 Early Days of Credit Cards 6 Limiting Losses 8

More information

Oakland Family Services - Was Your Email Hacked?

Oakland Family Services - Was Your Email Hacked? Oakland Family Services Information Breach FAQs 1. What happened? An unauthorized individual remotely gained access to the email account of one Oakland Family Services employee July 14, 2015 resulting

More information

How child identity theft happens.

How child identity theft happens. How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver

More information

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM I. Purpose & Scope THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s Red Flag Rules promulgated

More information

Why Avoiding LegalShield At Your Company Could Be Expensive For Your Business!

Why Avoiding LegalShield At Your Company Could Be Expensive For Your Business! Why Avoiding LegalShield At Your Company Could Be Expensive For Your Business! Don t your employees and their families deserve your help if your business knows about ways to keep them protected from the

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself Against Fraud and Identity Theft Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit

More information

Boynton Beach Chamber Lunch. How to Deter, Defend, and Detect Identity Theft July 11, 2012

Boynton Beach Chamber Lunch. How to Deter, Defend, and Detect Identity Theft July 11, 2012 Boynton Beach Chamber Lunch How to Deter, Defend, and Detect Identity Theft July 11, 2012 "Identity Theft and Assumption Deterrence Act of 1998" As amended by Public Law 105-318, 112 Stat. 3007 (Oct. 30,

More information

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules

An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings

More information

policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section.

policy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section. Name of Policy: Identity theft detection, prevention, and mitigation. Policy Number: 3364-15-12 Approving Officer: President Responsible Agent: Compliance Officer Scope: All University of Toledo Campuses

More information

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program

Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program A Case Study of Sam Houston State University s Red Flag Program Dr. Kristy L. Vienne Objective Participants will: Understand

More information

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain. Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse

More information

04 EMERGING AREAS OF IDENTITY THEFT 06

04 EMERGING AREAS OF IDENTITY THEFT 06 ! 01 WHAT IS IDENTITY THEFT? 02 02 HOW DOES IDENTITY THEFT HAPPEN? 03 03 WHO IS AT RISK FOR IDENTITY THEFT? 04 04 EMERGING AREAS OF IDENTITY THEFT 06 05 VICTIM STORIES 08 06 IF YOUR IDENTITY IS STOLEN

More information

Identity Theft and Strategies for Crime Prevention

Identity Theft and Strategies for Crime Prevention Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What

More information

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model

Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where there is a risk

More information