Appendix 1: Identity Theft Red Flags Mitigation and Resolution Procedures
|
|
|
- Neil Allen
- 10 years ago
- Views:
Transcription
1 Suspicious Personal Identifying Information Documents provided for identification appear to have been altered or forged. The photo or physical description of the person is not consistent with the appearance of the person. provided by the person is not consistent with other personal identifying information provided. provided is of a type associated with fraud. For example: the address is fictitious; phone number is invalid or associated with a pager The SSN provided is the same as that submitted by other persons opening an account or other customers provided is not consistent with personnel information that is on file with the financial institution, creditor or VMH Resident has an insurance number but never produces an insurance card or other physical documentation of insurance Stop the admission/billing process and Stop the admission/billing process and 1
2 Suspicious Account Activity Information about unauthorized charges in the resident s account Mail sent to the resident s home that s returned repeatedly as undeliverable although transactions continue to be conducted in connection with the resident s covered account Stop all account activities Notify the resident and/or NOK to provide additional satisfactory documentation to verify account activity. Stop all account activities. Skip-tracing procedures are used to find the resident s current HOR address Begin an internal inquiry into the account activities. Resident s family/responsible other notified If the results of the investigation do not indicate fraud, all contact and identity information is re-verified with the resident Notice From Other Sources A complaint or inquiry is received from a resident based on receipt of: -a bill for another person; -a bill for a product or service the resident denies receiving; -a bill from a healthcare provider that the resident never patronized; -a notice of insurance benefits (or explanation of benefits EOB) for health services never received by the resident; -information added to a credit report by a healthcare provider or insurance company; -a collection notice from a bill collector with whom the resident has had no transactions. -Investigate the complaint; -Interview individuals as appropriate; -Contact the other healthcare provider or insurance company; -Gather as much information as possible concerning the questionable bill. Contact the resident s family or POA to discuss the situation; Inform the CEO/designee of this discrepancy; Contact the local or State police, as needed, to notify them of these suspicious circumstances Follow police instructions, or contact the State Division of Consumer Affairs. 2
3 VMH is notified by a resident who is a victim of identity theft, by law enforcement, or by others that it has opened a fraudulent account for a person engaged in identity theft. An employee or volunteer or agency worker has access to a resident s SS number and other identifying information and buys goods based on resident s ID. Resident or insurance company report that coverage for legitimate hospital stay is denied because insurance benefits have been deleted or a lifetime cap has been reached Evidence that Resident Account files were accessed by unauthorized person(s) Investigate to determine if account was opened fraudulently or if billing was made fraudulently. Investigate the complaint; Interview individuals; Gather as much information as possible concerning the theft of a resident s Investigate complaint, interview individuals as appropriate If determination is made which files were accessed; re-verify account with resident or resident responsible party. Contact the CEO/designee continue service Contact insurance company as necessary Contact CEO/designee and the local or State police. Contact the credit card company, cancel that account umber continue service Contact insurance company as necessary If the results of the investigation do not indicate fraud, all contact and identity information is re-verified with the resident Enforce policy that Resident Account files must be locked when not in use. Limit access to files Provide dual lock security (i.e. door, file cabinet) Conduct periodic random review of Resident Accounts Evidence that Resident Medical Records were accessed by unauthorized person(s) 3 Maintain accurate/timely records signout log Process enforced to initial for key and use, log reviewed by Nursing supervisor Records locked when not in use
4 Complaint by a resident or observant employee that mail has been tampered with One department will be designated to handle all mail (i.e. Social Services) that Resident Face Sheet was being used/read by unauthorized individual(s) that Resident Blue Card was being used/read by unauthorized individual(s) This entity will then distribute both resident and VMH mail to appropriate addressee Report observation of unauthorized personnel accessing Face Sheet Report and missing face Sheets Educate staff on need to safeguard face Sheets Lock Blue Cards in box with limited access to keys/place box in a more concealed location Destroy current Blue cards replace with cards that contain to resident critical information that unauthorized access to electronic data especially MDS, has occurred that unauthorized access to Medical Insurance files has occurred/files containing identity records found open Investigate how unauthorized access occurred, interview individuals as appropriate 4 Train staff on sensitivity of Blue Cards and requirements to safeguard information contained on them Passwords changes every 90 days Employees instructed to log off computers when not in use and turn off at the end of the work day Instruct employees not to write down pass words and leave them in proximity to their computer; remove/block access points All incident recorded in security Officer s Log All Medical Insurance files locked at when not in use Establish dual lock security (i.e. door and file cabinet If determination made which files were observed, VMH will re-verify account with appropriate insurance company
5 Complaint or observation by employees that unauthorized access to employee records, payroll records, health records has occurred/files found open All employee records/ files locked when not in use Establish dual lock security (i.e. door and file cabinet) If determination made which files were observed, VMH will re-verify contents Revised: January 2011 Revised: August
Physician Office Compliance with the Red Flag Rule
Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy It is the policy of Kilgore Vision Center to follow all federal and state laws and reporting requirements regarding identity theft.
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
DSU Identity Theft Prevention Policy No. DSU 802.7.001
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 IDENTITY THEFT PREVENTION DSU Policy No. 802.7.001 SOURCE: Fair and Accurate
ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
Detecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
MCPHS IDENTITY THEFT POLICY
SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
DHHS POLICIES AND PROCEDURES
DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
Red Flag Rules Information and Training
Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit
Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft
George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
Identity Theft Prevention Program. Effective: November 1, 2009
Identity Theft Prevention Program Effective: November 1, 2009 I. BACKGROUND Galveston College ("College" / Institution ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
Red Flag Identity Theft Financial Policy 1.10
Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements
3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
identity TheFT PREVENTION Programs and Response
IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
Number: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
