AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL
|
|
- Camron Weaver
- 7 years ago
- Views:
Transcription
1 AN OVERVIEW OF MEDICAL IDENTITY THEFT INV. CHRIS KOBER #346 NEBRASKA STATE PATROL
2 Disclosure of Conflict of Interest This presenter has no significant financial interest/arrangement with any organization that could be perceived as a real or apparent conflict of interest with the subject matter of the presentation.
3 OBJECTIVES Identify the methods of obtaining personal information used to perpetrate medical identity theft. Discuss impact of medical identity theft. Apply preventive measures and techniques to reduce the risk of medical identity theft.
4 Medical Identity Theft Medical identity theft occurs when someone uses an individual s name and personal identifying information to fraudulently receive medical services, prescription drugs and/or goods, including attempts to commit fraudulent billing.
5 Comparison Regular ID Theft Financial crime Goal to make money Medical ID Theft Information crime Goal is frequently to get services or drugs Can happen in a healthcare Usually only happens in a institution healthcare institution or office using medical data Results in a loss of money Can result in financial loss, as well as, loss of life and/or medical benefits Victim usually finds out fairly Victim may not know for a long quickly time
6 Some Statistics You Should Know Medical ID theft has increased nearly 22% over the past year Medical ID theft increased from 3% to over 5% of all ID theft 2.4 millions victims of medical ID theft in 2014 Nearly 60% of victims know the suspect 60% of patients never review medical records for accuracy
7 Some Statistics You Should Know Average cost of medical bills = $23,346 Average cost to correct = $13,500 Estimated over $56 billion in cost to victims of medical ID theft Fraudulent billing is most common form of ID theft within Medicare and Medicaid Stolen or lost electronic devices are a large source of information for thieves
8 Some Statistics You Should Know Healthcare workers are most common source of theft within hospitals Only 40% of medical ID theft incidences are reported to law enforcement Average victims spends more than a year trying to correct medical ID theft and only 10% of incidences get fully corrected 80% of organizations responsible for maintaining medical records have reported data breaches
9 VICTIM PROFILE 30% have employer-based health insurance and 23% are Medicare/Medicaid 51% have higher education, college or above 50% full time employment and 13% part time employment 52% had reported income below $50,000 with and overall average income of $69,500 3 highest geographic regions Northeast (19%), Mid-Atlantic (18%), and the Midwest (18%).
10 TYPES OF MEDICAL IDENTITY THEFT Shared information. Intentionally provide information to a friend or family member due to no insurance or lack of adequate insurance coverage out of need for medical treatment.
11 TYPES OF MEDICAL IDENTITY THEFT Stealing someone else s information. Steal information through various means; data breach, phishing, mail theft, trash, electronic devices, wallet, ect, used to either receive services or obtain prescriptions for controlled substances.
12 TYPES OF MEDICAL IDENTITY THEFT Altering own information. Change your own information by altering spelling of name, DOB, SSN, address, and insurance policy numbers, most commonly done to obtain prescriptions for controlled substances.
13 TYPES OF MEDICAL IDENTITY THEFT Create fake Information. Simply create fake identity by creating a name, DOB, SSN, and insurance card most commonly done in order to obtain prescriptions for controlled substances.
14 TYPES OF MEDICAL IDENTITY THEFT Fraudulent billing. Billing for services never rendered or up-coding services to a higher billing code in order to collect higher payments, also perpetrated by organized crime groups to collect money.
15 TYPES OF MEDICAL IDENTITY THEFT Professional Identity Theft. Stealing identity of medical professionals to include name, business address, DEA number, and prescription pad format, most commonly in order to obtain controlled substances.
16 RISKS OF MEDICAL IDENTITY THEFT Improper medical information. Record could include wrong blood type and medication allergies which could have deadly consequences. Record could also included diagnosis such as mental illness which could have far reaching and damaging effects that could follow you throughout life. Improper medical information throughout entire network and electronic records database.
17 RISKS OF MEDICAL IDENTITY THEFT Loss or denial of benefits. Cancellation of insurance, maximum benefit caps, and denial of life insurance due to information contained in medical record. Professionals may not receive payment for services rendered to ID thieves.
18 RISKS OF MEDICAL IDENTITY THEFT Miss or missed diagnosis on the basis of the wrong information. Professionals could potentially overlook initial diagnosis information due to medical records indicating procedures having already been completed such as appendix or gall bladder removed causing delays and possibly wrong treatment.
19 RISKS OF MEDICAL IDENTITY THEFT Financial loss due to unpaid medical bills. In addition to the unpaid medical bills victims face issues with bill collectors, loan or mortgage denials, higher interest rates, higher insurance rates, lose of employment or denial of employment opportunities, and wage garnishment. Providers potentially never paid or having to return payments that were made for services.
20 RISKS OF MEDICAL IDENTITY THEFT Loss or damage to reputation. Employer-based insurance, where information is given to employer. Embarrassment due to the disclosure of sensitive personal health conditions. Professions reputation damaged due to loss of confidence in provider by patients.
21 RISKS OF MEDICAL IDENTITY THEFT Legal issues. Subpoenas for medical records in defense of cases. Failed drug tests by ID thieves resulting in legal issues for victims. Professionals being sued by victims for breaches of medical information and face sanctions or fines from government or regulatory bodies.
22 RISKS OF MEDICAL IDENTITY THEFT Loss of time. Victims could spend months even years to try to get medical records corrected. Professionals could face sanctions or scrutiny from licensure and other regulatory bodies.
23 WHY MEDICAL IDENTITY THEFT Desperation, need, or necessity Personal use or personal gain Pressure from friends, family, or significant other Love triangles Revenge
24 WHY MEDICAL IDENTITY THEFT Disgruntled employees Malicious actions Blackmail financial gain Just for fun or the challenge
25 POTENTIAL PERPETRATORS Friends and family Neighbors Drug addicts Contract workers Entry level employees Temp staff or staffing services
26 POTENTIAL PERPETRATORS Cleaning service staff Drug dealers Organized crime groups Medical professionals Hackers
27 PREVENTIVE MEASURES Record and monitor access to systems. Restrict personal cell phone and camera use by employees. Strong information technology restrictions. Written medical identity theft policy and response plan. Establish monitoring of records for red flags. Sequestering method for incorrect information
28 PREVENTIVE MEASURES Trust your instincts. Check identification, make sure it matches. (Photocopy license or ID card) Examine documents that are presented. Complete detailed intake sheet for every visit. (Currently seeing any doctors or taking any medications?) Do not provide any information to patient. (Address, DOB, SSN, leading questions)
29 PREVENTIVE MEASURES Take photo of patient or have video in clinic. Document identifying characteristics. (Scars, marks, tattoos, unique physical characteristics) Check with previous doctors. Check within your network and other networks. Check with pharmacy. (e.g., Walgreens, CVS, Wal-Mart, Target, Shopko, Bakers) Background check of employees.
30 PREVENTIVE MEASURES Report suspicious patients and incidents. Examine explanation of benefits. Monitor insurance benefits. Check credit history. Check medical record. File police report
31 AN OVERVIEW OF MEDICAL IDENTITY THEFT QUESTIONS?
32 Contact Information Investigator C. Kober#346 Nebraska State Patrol 2707 N 108 th Street Omaha, NE (office) (direct) (fax) (cell) (24hr) christopher.kober@nebraska.gov
Consumer Information Sheet 16 October 2013
First Aid For Medical Identity Theft Tips for Consumers Consumer Information Sheet 16 October 201 When another person uses your personal information to get medical services or goods, or to gain financially,
More informationIdentity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
More informationIntegrity We are above reproach in everything we do.
Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above
More informationHIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
More informationThe High Price of Medical Identity Theft and Fraud
The High Price of Medical Identity Theft and Fraud Some Quick Facts 3 times more likely to be ID fraud victim if credit/debit card breached 1 New ID fraud victim every 2 seconds 2 Few adults are familiar
More informationThird Annual Survey on Medical Identity Theft
Third Annual Survey on Medical Identity Theft Sponsored by Experian s ProtectMyID Independently conducted by Ponemon Institute LLC Publication Date: June 2012 Ponemon Institute Research Report Part 1:
More information2013 Survey on Medical Identity Theft
2013 Survey on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from ID Experts Independently conducted by Ponemon Institute LLC Publication Date: September 2013 Ponemon
More informationSCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection
SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How
More informationHealthcare Utilizing Trusted Identity Credentials
Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationData Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
More informationACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
More informationRed Flag Policy and Procedures for Alexander Orthopaedic Associates
Red Flag Policy and Procedures for Alexander Orthopaedic Associates The Identify Theft Prevention Program developed by Alexander Medical Group LLC dba Alexander Orthopaedic Associates referred throughout
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationSpotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationFacts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
More informationIdentity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views
More informationStopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
More informationIdentity Theft Problem and Solutions
Identity Theft Problem and Solutions October 7, 2011 Michigan Cyber Summit 2011 Jon Miller Steiger Regional Director The views expressed are those of the speaker and not necessarily those of the FTC or
More informationIdentity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy It is the policy of Kilgore Vision Center to follow all federal and state laws and reporting requirements regarding identity theft.
More informationProtect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
More informationRANDOLPH COUNTY HEALTH DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY HEALTH DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Health Department ( the Department
More informationNCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
More informationRED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft
RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union
More informationDHHS POLICIES AND PROCEDURES
DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:
More informationMedicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010
Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an
More informationRANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
More informationCovered Areas: Those EVMS departments that have activities with Covered Accounts.
I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with
More informationNOTICE OF PRIVACY PRACTICES
FRANKLIN SQUARE EYE CARE 918 HEMPSTEAD TPKE FRANKLIN SQUARE, NY 11010 TEL #: (516) 354-4242 FAX #: (516) 354-7788 E-mail: franklineyecare@gmail.com OFFICE CONTACT PERSON: SHERIN GEORGE O.D. NOTICE OF PRIVACY
More informationCITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
More informationSUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:
SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED
More informationPREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro. Presented By Roy Davenport Shred-it North Carolina
PREVENTING IDENTITY THEFT AT The University of North Carolina at Greensboro Presented By Roy Davenport Shred-it North Carolina Identity Theft in the US: How BIG Is The Problem? FTC Says it is the fastest
More informationMedicare 101. Presented by Area Agency on Aging 1-A
Medicare 101 Presented by Area Agency on Aging 1-A What is Medicare? n Federal Health Insurance for: n People 65 years of age or older n Some persons with disabilities, after a 24 month waiting period
More informationIdentity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012
Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is
More informationDo s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
More informationWHEREAS the Federal Trade Commission regulations include utility companies in the definition of creditor;
CITY OF STATE OF GEORGIA ORDINANCE NO: AN ORDINANCE TO AMEND THE CODE OF ORDINANCES, CITY OF, GEORGIA TO PROVIDE A NEW ARTICLE, IDENTITY THEFT PREVENTION PROGRAM; TO COMPLY WITH FEDERAL REGULATIONS RELATING
More informationScope All [Name of Facility] operations
Scope All [Name of Facility] operations Purpose To describe the measures to be followed when health care is obtained under a fictitious name or in another person s name. This includes situations when a
More informationFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft Sponsored by the Medical Identity Fraud Alliance with support from: Kaiser Permanente, ID Experts, Experian Data Breach Resolution and Identity Finder, LLC
More informationCyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group
Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationAppendix 1: Identity Theft Red Flags Mitigation and Resolution Procedures
Suspicious Personal Identifying Information Documents provided for identification appear to have been altered or forged. The photo or physical description of the person is not consistent with the appearance
More informationRed Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
More informationPrevention is Better than Cure: Protect Your Medical Identity
Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical
More informationThe High Price of Medical Identity Theft and Fraud. Ann Patterson Medical Identity Fraud Alliance
The High Price of Medical Identity Theft and Fraud The High Price of Medical Identity Theft and Fraud Ann Patterson Medical Identity Fraud Alliance Medical Identity Theft Primer Includes theft of Protected
More informationOuachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
More informationIdentity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section
Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic
More informationI know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
More informationAdministrative Procedures Memorandum A1452
Page 1 of 11 Date of Issue February 2, 2010 Original Date of Issue Subject References February 2, 2010 PRIVACY BREACH PROTOCOL Policy 2197 Management of Personal Information APM 1450 Management of Personal
More informationMedicare Compliance and Fraud, Waste, and Abuse Training
Medicare Compliance and Fraud, Waste, and Abuse Training Objectives Recognize laws and concepts affecting compliance and fraud, waste, and abuse (FWA) Increase awareness of FWA Use identification techniques
More informationMedicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011
Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid
More informationUnderstanding our requirements and ensuring compliance
Understanding our requirements and ensuring compliance The FTC = Federal Trade Commission The FTC issued the Red Flag Rule as part of the Fair and Accurate Credit Transaction Act of 2003 (FACT Act), Sections
More informationAdvanced Identity Theft - The Big Picture
The National Center for Victims of Crime is pleased to provide the slides used in our March 26, 2015 Webinar, Advanced Identity Theft. Please be advised that these materials are provided through the generosity
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationRC284. Protect Yourself Against Identity Theft
RC284 Protect Yourself Against Identity Theft Identity theft the unauthorized use of your information by third parties involves the collection and use of personal information such as your name, date of
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationProtecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment
More informationAn Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy
An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims
More informationIdentity Theft Assistance: Information for Recovering Your Good Name
Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed
More informationCalifornia State University, Chico. Identity Theft Prevention Red Flags Program
Identity Theft Prevention Red Flags Program Version 1.0 November 16, 2010 REVIEW/APPROVAL HISTORY Document Title: Author: Brooke F. Banks, Information Security Officer Date By Action Pages 10/30/2009 Bill
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationIDENTITY THEFT PROCEDURES
IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the
More informationFTC FACTS for Consumers
ftc.gov FOR THE CONSUMER FTC FACTS for Consumers FEDERAL TRADE COMMISSION 1-877-FTC-HELP Medical Identity Theft C ould identity thieves be using your personal and health insurance information to get medical
More informationInformation to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationPurpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management
Purpose Components Examples of Non-Compliance Applicable Laws & Regulations Responsibilities & Management The purpose of a Compliance Program is To reduce the risk or error or fraud Designed to ensure
More informationWeber Human Services Identity Theft Prevention Policy
Weber Human Services Identity Theft Prevention Policy Purpose: Weber Human Services (WHS) is committed to protecting the privacy of the Protected Health Information ( PHI ) of our clients and the Personal
More informationIdentity Theft in Healthcare
Identity Theft in Healthcare Presented by: Donna Gilley, CCP, CHC Wynelle Paige, RHIA, CCP LBMC Healthcare Group, LLC Compliance Advisory Coalition Dgilley@lbmc.com mwpaige@charter.net 615-309-2376 865-621-2095
More informationOFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT
OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT Attorney General Derek Schmidt BEING A SMART CONSUMER Jackie Williams, Assistant Attorney General Consumer Protection Division Duties of the Attorney General:
More informationSOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule
SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose
More informationFraud and Abuse and How it Affects the Coder
Fraud and Abuse and How it Affects the Coder Presented by: Laura E Hill, CPC, CPC-I, MCS-P What is Fraud? In the simplest terms, fraud occurs when someone knowingly and with intent to defraud, presents
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Implemented October 2009 Page 1 Table of Contents Background... 3 Purpose... 3 Definitions... 3 Pretext Calling... 4 Receiving Telephone Calls... 5 Change of Address...
More informationWISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
More informationChild Identity Theft Study
Child Identity Theft Study Conducted by Javelin Strategy & Research October 2008 2008 Javelin Strategy & Research All Rights Reserved Executive Summary Rarely do parents or guardians consider the possibility
More informationMedical Information Breaches: Are Your Records Safe?
Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential
More informationRed Flag Rules Information and Training
Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit
More informationS12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente
S12: Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita Janiga, Kaiser Permanente Medical Identity Theft and Red Flag Rules: The Health Plan Perspective Marita C. Janiga Director,
More informationDo You Know Where the Drugs Are Going? Partners in Integrity
Do You Know Where the Drugs Are Going? Partners in Integrity Objectives At the conclusion of this presentation, participants will be able to: Identify common types of drug diversion activities. List at
More informationPhysician Office Compliance with the Red Flag Rule
Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician
More informationIdentity Theft Prevention Program. Approved by the Arizona Board of Regents on May 1, 2009
Identity Theft Prevention Program Approved by the Arizona Board of Regents on May 1, 2009 I. Purpose & Scope This Program was developed pursuant to the Federal Trade Commission s ( FTC ) Red Flag Rules
More informationIdentity Theft. Providing Your Student with a Safety Net By Sun Ow
Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial
More informationIdentity Theft Simple ways to keep your sensitive information safe.
Keep yourself safe from Identity Theft Simple ways to keep your sensitive information safe. Be Aware Identity theft is the number one consumer fraud perpetrated on unsuspecting citizens. In 2011, nearly
More informationHIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
More information4/13/2016. Safeguarding Your Medical Identity. Learning Objectives. Dr. Peters Tale of Identity Theft. Presentation
Safeguarding Your Medical Identity Presentation Learning Objectives Describe medical identity theft and the associated problems Recognize the risks for medical identity theft List strategies to mitigate
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft About Medical Identity Theft and Health Information Breaches... 1 What is medical identity theft?... 1 What are the dangers of medical identity theft?... 1 How do
More informationAbout the Author. Acknowledgments
About the Author Foreword Preface Acknowledgments xv xvii xix xxiii 1 THE IDENTITY THEFT EXPLOSION 1 What Is Identity Theft? 2 It Is Not Rocket Science 3 Early Days of Credit Cards 6 Limiting Losses 8
More informationOakland Family Services - Was Your Email Hacked?
Oakland Family Services Information Breach FAQs 1. What happened? An unauthorized individual remotely gained access to the email account of one Oakland Family Services employee July 14, 2015 resulting
More informationHow child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
More informationTHE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM
I. Purpose & Scope THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s Red Flag Rules promulgated
More informationWhy Avoiding LegalShield At Your Company Could Be Expensive For Your Business!
Why Avoiding LegalShield At Your Company Could Be Expensive For Your Business! Don t your employees and their families deserve your help if your business knows about ways to keep them protected from the
More informationDeterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
More informationProtecting Yourself Against Fraud and Identity Theft
Summit Branches are conveniently located in Rochester (8), Seneca Falls (1), Buffalo (2), Syracuse (5) and Cortland (2) Protecting Yourself Against Fraud and Identity Theft A presentation by The Summit
More informationBoynton Beach Chamber Lunch. How to Deter, Defend, and Detect Identity Theft July 11, 2012
Boynton Beach Chamber Lunch How to Deter, Defend, and Detect Identity Theft July 11, 2012 "Identity Theft and Assumption Deterrence Act of 1998" As amended by Public Law 105-318, 112 Stat. 3007 (Oct. 30,
More informationAn Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules
An Overview of the Identity Theft Red Flags and Address Discrepancies under the Fair and Accurate Credit Transactions Act of 2003 Final Rules By: Andrea J. Shaw, Esq., Compliance Officer, Gorham Savings
More informationpolicy All terms used in this policy that are defined in 16 C.F.R. 681.2 shall have the same meaning provided in that section.
Name of Policy: Identity theft detection, prevention, and mitigation. Policy Number: 3364-15-12 Approving Officer: President Responsible Agent: Compliance Officer Scope: All University of Toledo Campuses
More informationRed Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program
Red Flag Rules: A Step by Step Guide to Developing a Prevention & Training Program A Case Study of Sam Houston State University s Red Flag Program Dr. Kristy L. Vienne Objective Participants will: Understand
More informationProtection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.
Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse
More information04 EMERGING AREAS OF IDENTITY THEFT 06
! 01 WHAT IS IDENTITY THEFT? 02 02 HOW DOES IDENTITY THEFT HAPPEN? 03 03 WHO IS AT RISK FOR IDENTITY THEFT? 04 04 EMERGING AREAS OF IDENTITY THEFT 06 05 VICTIM STORIES 08 06 IF YOUR IDENTITY IS STOLEN
More informationIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
More informationWisconsin Rural Water Association Identity Theft Prevention Program Compliance Model
Wisconsin Rural Water Association Identity Theft Prevention Program Compliance Model All utilities are required to comply with this regulation. The Red Flag Rule requires any entity where there is a risk
More information