FY13 Core Training. Click next to continue
|
|
|
- Leslie James
- 10 years ago
- Views:
Transcription
1 Identity Theft Prevention Program FY13 Core Training Click next to continue
2 Course Information Course Title: Regulations/Standards: Approximate Time to Complete: Intended Audience: Identity Theft Prevention Program Federal Trade Commission (FTC) Identity Theft Training Requirements 15 minutes All LVHN employed staff Technical Specifications: Flash player 9. Internet Explorer 6. Date Revised: August 2012 Contact Information Please forward any content questions or concerns to the Subject Matter Expert: Carol Kriebel at Please call the Help Desk at with any technical issues. This course does not contain audio.
3 Objectives Upon completion of this course, you should be able to: Explain the purpose p of the LVHN Identity Theft Program Define medical identity theft List three consequences of identity theft List precautions that individuals can take to avoid identity theft Identify the appropriate information that should be obtained to verify patient identity and four acceptable forms of identification Identify the four categories of red flags for identity theft in healthcare Are you ready to test your knowledge? To test your knowledge, you can click the Demonstrate Knowledge button to move to the final test.
4 Purpose In January 2008, the Federal Trade Commission (FTC) issued a set of regulations requiring certain organizations to develop a written program to spot the warning signs or red flags of identity theft. The purpose of the Identity Theft Prevention Program at Lehigh Valley Health Network is to detect, prevent, decrease, and respond to identity theft. The Identity Theft Prevention Program looks for potential cases of identity theft by assessing patterns, practices and actions - these are the red flags of identity theft. LVHN s Identity Theft Prevention Program follows the guidelines issued by the FTC and the Fair and Accurate Credit Transactions (FACT) act. Click here to review the Identity Theft Prevention Program
5 What is Identity Theft? Identity Theft: Fraud committed or attempted using the identifying information of another person. Identity theft can cause severe consequences for its victims. Identity theft can be broken down into sub-categories: 1. Financial Identity Theft 2. Medical Identity Theft According to the FTC, identity theft is the # 1 consumer complaint.
6 Medical Identity Theft The World Privacy Organization defines medical identity theft as theft that occurs when someone uses another person s person s name and other parts of their identity (such as insurance information or social security number) without the victim s knowledge or consent to: Receive medical services or goods Make false claims for money In the process, false information is added to the victim s medical record.
7 Consequences of Identity Theft Mr. Miller is the unknowing victim of medical identity theft. Claims have been submitted in his name for procedures that he never had. How do you think this will impact Mr. Miller? Consequences Click the button to learn more about the consequences of medical identity theft.
8 Consequences of Identity Theft Because false claims have been submitted in Mr. Miller s name, his medical record shows information that is false. Identity theft can impact: Insurance Coverage Medical Care Credit and Finances As a result Mr. Miller could: Be denied insurance coverage Receive unsafe medical care and false diagnoses Have credit and financial problems
9 Avoiding Identity Theft Take these precautions to protect yourself: Share personal health information only with trusted providers Review the Explanation of Benefits to monitor claims submitted in your name Request an annual summary of benefits paid from the insurer Review your credit history
10 Steps LVHN Has Taken To help prevent identity theft, LVHN has: Established a verification process Minimized the use of social security numbers Created safeguards for all identifiable health information Implemented procedures for the disposal and destruction of health information
11 Why is the Program Important? The LVHN Identity Theft Prevention Program is important because it is required by the government. The Federal Trade Commission (FTC) requires a written program to spot the warning signs of identity theft. The program also benefits the Network. By having an Identity Theft Prevention Program, LVHN is able to quickly identify and correct any potential identity theft risks.
12 Red Flags
13 Suspicious Documents
14 Suspicious Identifying Information
15 Suspicious Activity to an Account
16 Alerts From Others
17 Patient Verification To help prevent identity theft, LVHN has implemented a verification process for both new and existing patients. Obtain the appropriate demographic and insurance information from your patient. This includes: Full name Date of birth Address Social Security Number Photo ID/Driver s License Insurance card You should also verify electronic insurance You should also verify electronic insurance eligibility for all carriers.
18 Acceptable Forms of Identification Acceptable forms of identification include: Driver s License Birth Certificate Passport Military ID Social Security Card School ID Work ID Permanent Residence Card (Green Card) Voter Registration Card If you have any concerns or questions regarding a patient s identity, ask for a second form of identification to verify the patient s identity.
19 If You Suspect Identity Theft When you suspect identity theft: 1 Gather information DO NOT confront the patient t 2 Provide Care NEVER turn a patient away! 3 Notify your supervisor/manager 4 Notify Security ( ) and provide: Name Medical record number Account number (when applicable) 5 Complete a Patient Safety Report Click the icon on your SSO Toolbar
20 Ready to Test Your Knowledge? You should now be able to: Explain the purpose of the LVHN Identity Theft Program Define medical identity theft List three consequences of identity theft List precautions that individuals can take to avoid identity theft Identify the appropriate information that should be obtained to verify patient identity and four acceptable forms of identification Identify the four categories of red flags for identity theft in healthcare If you are ready to take the final test, click the test button below. You must earn a score of at least 80% to successfully complete the course.
RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft
RED FLAGS RULE Identifying, Detecting, & Mitigating Possible Identity Theft What is the Red Flag Rule? The Federal Trade Commission (FTC), along with federal bank regulators and the National Credit Union
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy It is the policy of Kilgore Vision Center to follow all federal and state laws and reporting requirements regarding identity theft.
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Physician Office Compliance with the Red Flag Rule
Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft
George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT
HOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
University of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
Tips for Submitting Supporting Documents to the Health Insurance Marketplace Center for Consumer Information and Insurance Oversight (CCIIO)
Tips for Submitting Supporting Documents to the Health Insurance Marketplace Center for Consumer Information and Insurance Oversight (CCIIO) March 20, 2015 Two Reasons Consumers May Need to Submit Supporting
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.
RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
Red Flag Rules Information and Training
Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit
SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
IDENTITY THEFT AND MUNICIPAL UTILITIES
Minnesota Municipal Utilities Association IDENTITY THEFT AND MUNICIPAL UTILITIES Identity Theft and Red Flags Rule requirements The Red Flags Rule implements portions of the Fair and Accurate Credit Transactions
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
Prepared by Sgt. Gibbs, Thomas B. 82-11
Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:
SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: ISSUED: 11/7/06 REVISED: 3/16/07; 5/6/08 (web reference updates only) Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED
POLICY TITLE: IDENTITY THEFT PROTECTION POLICY
POLICY TITLE: IDENTITY THEFT PROTECTION POLICY I. Purpose The purpose of this policy is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
Identity Theft Victim Checklist
Page 1 of 5 Identity Theft Victim Checklist CONSUMER INFORMATION SHEET 3 This checklist can help identity theft victims to clear up their records. It lists the actions most identity theft victims should
Number: 56.300. Index
Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND
The Home Depot Provides Update on Breach Investigation
The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers
IDENTITY THEFT PROCEDURES
IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the
