Physician Office Compliance with the Red Flag Rule
|
|
|
- Susanna Cain
- 10 years ago
- Views:
Transcription
1 Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician offices, to design and implement a compliance policy appropriate to their size and complexity. The 26 examples of Red Flags are not a checklist (Attachment 1), but rather, examples that your practice may want to use as warning signs of identify theft. Again, no two practices are identical, so your compliance policy must be developed accordingly. A sample policy that can be easily customized for your practice has been developed by the American Medical Association, with information included to assist DCMS members to report cases of identify theft (Attachment 2). Furthermore, the following guidelines can be used as generic summary as to what is included in the compliance policy for addressing the FTC Red Flag Rules: Develop Red Flag Policies and Procedures for your office (Attachment 2). Review the 26 example red flags with staff and be prepared to report them to the appropriate agency as you deem necessary (Attachment 1). Recognize that Red Flag Rules are not relevant to HIPAA and require a separate, internal compliance policy. Establish an admission or check-in policy that requires patients to provide both a state photo identification (e.g., drivers license) and insurance card. Any employees involved in this process should be involved in the development of the compliance program. Ensure that the compliance policy best suits the size of your practice (i.e., risks and program complexity will be much greater for large practices and less for smaller practices). Update the policy periodically. This can be done annually along with the review and update of other internal policies (e.g., employee handbook, OSHA compliance, etc.). Make certain staff are effectively trained and informed of any changes to the policy at any time. Document approval of the new red flags policy and procedure by the Board of Directors or internal memorandum For the Record of the practice. *Filing a Complaint The FTC, the nation s consumer protection agency, works to prevent fraudulent, deceptive, and unfair business practices in the marketplace and to provide information to help consumers notice, stop, and avoid said practices. To report or discuss a case of identify theft, call toll free or go to the FTC online, at for more information. Medicaid fraudrelated complaints should be reported to the Florida Medicaid Fraud Control Unit at Similar to any situation whereby a patient becomes unruly or disruptive, a confrontation with a patient regarding suspected identify theft is a possibility. It is recommended that the practice contact the Jacksonville Sheriff Office s non-emergent line ( ) for assistance if uncontrollable, disruptive behavior is experienced. Of course, 911 is reserved for life-threatening emergencies. Additional Assistance: Should you still have questions or wish to identify an attorney for legal guidance, please contact Jay Millson, DCMS Executive Director, at , ext. 105, for assistance.
2 The 26 Red Flag Rules Attachment 1 1. A fraud alert included with a consumer report. 2. Notice of a credit freeze in response to a request for a consumer report. 3 A consumer reporting agency providing a notice of address discrepancy. 4. Unusual credit activity, such as an increased number of accounts or inquiries. 5. Documents provided for identification appearing altered or forged. 6. Photograph on ID inconsistent with appearance of customer. 7. Information on ID inconsistent with information provided by person opening account. 8. Information on ID, such as signature, inconsistent with information on file at financial institution. 9. Application appearing forged or altered or destroyed and reassembled. 10. Information on ID not matching any address in the consumer report, Social Security number has not been issued or appears on the Social Security Administration s Death Master File, a file of information associated with Social Security numbers of those who are deceased. 11. Lack of correlation between Social Security number range and date of birth. 12. Personal identifying information associated with known fraud activity. 13. Suspicious addresses supplied, such as a mail drop or prison, or phone numbers associated with pagers or answering service. 14. Social Security number provided matching that submitted by another person opening an account or other customers. 15. An address or phone number matching that supplied by a large number of applicants. 16. The person opening the account unable to supply identifying information in response to notification that the application is incomplete. 17. Personal information inconsistent with information already on file at financial institution or creditor. 18. Person opening account or customer unable to correctly answer challenge questions. 19. Shortly after change of address, creditor receiving request for additional users of account. 20. Most of available credit used for cash advances, jewelry or electronics, plus customer fails to make first payment. 21. Drastic change in payment patterns, use of available credit or spending patterns. 22. An account that has been inactive for a lengthy time suddenly exhibiting unusual activity. 23. Mail sent to customer repeatedly returned as undeliverable despite ongoing transactions on active account. 24. Financial institution or creditor notified that customer is not receiving paper account statements. 25. Financial institution or creditor notified of unauthorized charges or transactions on customer s account. 26. Financial institution or creditor notified that it has opened a fraudulent account for a person engaged in identity theft. Source: Federal Trade Commission
3 [Insert Physician Practice Name] Identity Theft Prevention and Detection and Red Flag Rule Compliance Policy & Procedures Attachment 2 Policy It is the policy of [physician practice name] to follow all federal and state laws and reporting requirements regarding identity theft. Specifically, this policy outlines how [physician practice name] will (1) identify, (2) detect and (3) respond to red flags. A red flag as defined by this policy includes a pattern, practice, or specific account or record activity that indicates possible identity theft. It is the policy of [physician practice name] that this identity theft prevention and detection and Red Flags Rule compliance program is approved by [physician practice name Board of Directors or appropriate committee /representative] as of May 1, 2009, and that the policy is reviewed and approved no less than annually. It is the policy of [physician practice name] that [specific staff person s title here] is assigned the responsibility of implementing and maintaining the Red Flag Rule requirements. Furthermore, it is the policy of this [physician practice name] that this individual will be provided sufficient resources and authority to fulfill these responsibilities. At a minimum, it is the policy of [physician practice name] that there will be one individual or job description designated as the privacy official. It is the policy of [physician practice name] that, pursuant to the existing HIPAA Security Rule, appropriate physical, administrative and technical safeguards will be in place to reasonably safeguard protected health information and sensitive information related to patient identity from any intentional or unintentional use or disclosure. It is the policy of [physician practice name] that its business associates must be contractually bound to protect sensitive patient information to the same degree as set forth in this policy. It is also the policy of [physician practice name] that business associates who violate their agreement will be dealt with first by an attempt to correct the problem, and if that fails by termination of the agreement and discontinuation of services by the business associate. It is the policy of [physician practice name] that all members of our workforce have been trained by the May 1, 2009, compliance date on the policies and procedures governing compliance with the Red Flag Rule. It is also the policy of [physician practice name] that new members of our workforce receive training on these matters within a reasonable time after they have joined the workforce. It is the policy of [physician practice name] to provide training should any policy or procedure related to the Red Flag Rule materially change. This training will be provided within a reasonable time after the policy or procedure materially changes. Furthermore, it is the policy of [physician practice name] that training will be documented, indicating participants, date and subject matter. Procedures I. Identify Red Flags In the course of caring for patients, [physician practice name] may encounter inconsistent or suspicious documents, information or activity that may signal identity theft. [physician practice name] identifies the following as potential red flags, and this policy includes procedures describing how to detect and respond to these red flags below: 1. A complaint or question from a patient based on the patient s receipt of: A bill for another individual A bill for a product or service that the patient denies receiving A bill from a health care provider that the patient never patronized A notice of insurance benefits (or explanation of benefits) for health care services never received 2. Records showing medical treatment that is inconsistent with a physical examination or with a medical history as reported by the patient.
4 3. A complaint or question from a patient about the receipt of a collection notice from a bill collector. 4. A patient or health insurer report that coverage for legitimate hospital stays is denied because insurance benefits have been depleted or a lifetime cap has been reached. 5. A complaint or question from a patient about information added to a credit report by a health care provider or health insurer. 6. A dispute of a bill by a patient who claims to be the victim of any type of identity theft. 7. A patient who has an insurance number but never produces an insurance card or other physical documentation of insurance. 8. A notice or inquiry from an insurance fraud investigator for a private health insurer or a law enforcement agency, including but not limited to a Medicare or Medicaid fraud agency. 9. [Insert other relevant practice-specific items here] II. Detect Red Flags [Physician practice name] practice staff will be alert for discrepancies in documents and patient information that suggest risk of identity theft or fraud. [Physician practice name] will verify patient identity, address and insurance coverage at the time of patient registration/check-in. Procedures: 1. When a patient calls to request an appointment, the patient will be asked to bring the following at the time of the appointment: Driver s license or other state issued photo ID Current health insurance card Utility bills or other correspondence showing current residence if the photo ID does not show the patient s current address. If the patient is a minor, the patient s parent or guardian should bring the information listed above. 2. When the patient arrives for the appointment, the patient will be asked to produce the information listed above. This requirement may be waived for patients who have visited the practice within the last six months. However, this is a minimal burden on the practice to require the information every visit. 3. If the patient has not completed the registration form within the last six months, registration staff will verify current information on file and, if appropriate, update the information. 4. Staff should be alert for the possibility of identity theft in the following situations: The photograph on a driver s license or other photo ID submitted by the patient does not resemble the patient. The patient submits a driver s license, insurance card, or other identifying information that appears to be altered or forged. Information on one form of identification the patient submitted is inconsistent with information on another form of identification or with information already in the practice s records. An address or telephone number is discovered to be incorrect, non-existent or fictitious. The patient fails to provide identifying information or documents. The patient s signature does not match a signature in the practice s records. [If your practice collects Social Security number]: The Social Security number or other identifying information the patient provided is the same as identifying information in the practice s records provided by another individual, or the Social Security number is invalid. III. Respond to Red Flags If an employee of [physician practice name] detects fraudulent activity or if a patient claims to be a victim of identity theft, [physician practice name] will respond to and investigate the situation. If the fraudulent activity involves protected health information (PHI) covered under the HIPAA security standards, [physician practice name] will also apply its existing HIPAA security policies and procedures
5 to the response. If potentially fraudulent activity (a red flag) is detected by an employee of [physician practice name]: 1. The employee should gather all documentation and report the incident to his or her immediate supervisor (or designated compliance officer/privacy official, if applicable). 2. The supervisor (or designated compliance officer/privacy official, if applicable) will determine whether the activity is fraudulent or authentic based upon the evidence presented. 3. If the activity is determined to be fraudulent, then [physician practice name] should take immediate action. Actions may include: Cancel the transaction Notify appropriate enforcement agencies Notify the affected patient Notify affected physician(s) Assess impact to practice. If a patient claims to be a victim of identity theft: the patient should be encouraged to file a police report for identity theft if he/she has not done so already the patient should be encouraged to complete the ID Theft Affidavit developed by the FTC, along with supporting documentation [physician practice name] will compare the patient s documentation with personal information in the practice s records. If following investigation, it appears that the patient has been a victim of identity theft, [physician practice name] will promptly consider what further remedial act/notifications may be needed under the circumstances, including: the physician shall review the affected patient s medical record to confirm whether documentation was made in the patient s medical record that resulted in inaccurate information in the record. If inaccuracies due to identity theft exist, a notation should be made in the record to indicate identity theft. the practice medical records staff will determine whether any other records and/or ancillary service providers are linked to inaccurate information. Any additional files containing information relevant to identity theft will be removed and appropriate action taken. The patient is responsible for contacting ancillary service providers. If following investigation, it does not appear that the patient has been a victim of identity theft, [physician practice name] will take whatever action it deems appropriate. Policy Prepared by the American Medical Association
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.
Identity Theft Prevention & Detection Red Flags Rule Compliance Policy It is the policy of Kilgore Vision Center to follow all federal and state laws and reporting requirements regarding identity theft.
Administrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation
Guidelines to FTC Red Flag Rule(reformatted) Appendix A to Part 681 Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 681.2 of this part requires each financial institution
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
Detecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.
ACCG Identity Theft Prevention Program ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia 30303 (404)522-5022 (404)525-2477 www.accg.org July 2009 Contents Summary of ACCG Identity Theft Prevention Program...
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009
[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM Effective May 1, 2009 Because [FACILITY NAME] offers and maintains covered accounts, as defined by 16 C.F.R. Part 681 (the Regulations ), [FACILITY NAME]
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009
RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services
EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);
EXHIBIT A Identity Theft Protection Program Definitions. For purposes of the Policy, the following definitions apply (1); A. City means: the City of Troy, Montana B. Covered Account means: An account that
Red Flag Rules and Aging Services: What You Need to Know
Red Flag Rules and Aging Services: What You Need to Know Late in 2007, six federal agencies, including the Federal Trade Commission ( FTC ), jointly issued final rules and accompanying guidelines to implement
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
University Policy: Identity Theft Prevention Policy
University Policy: Identity Theft Prevention Policy Policy Category: Ethics, Integrity and Legal Compliance Policies Subject: Detection, prevention and mitigation of identity theft Office Responsible for
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
identity TheFT PREVENTION Programs and Response
IDENTITY THEFT PREVENTION PROGRAM This program is launched in response to the Federal Trade Commission Red Flag Rules and Address Discrepancy Rules in conjunction with the Fair and Accurate Credit Transaction
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
DSU Identity Theft Prevention Policy No. DSU 802.7.001
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 IDENTITY THEFT PREVENTION DSU Policy No. 802.7.001 SOURCE: Fair and Accurate
University of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
Red Flag Identity Theft Financial Policy 1.10
Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements
Red Flag Rules Information and Training
Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit
Appendix 1: Identity Theft Red Flags Mitigation and Resolution Procedures
Suspicious Personal Identifying Information Documents provided for identification appear to have been altered or forged. The photo or physical description of the person is not consistent with the appearance
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
University of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
Identity Theft Prevention Program
Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity
DHHS POLICIES AND PROCEDURES
DHHS POLICIES AND PROCEDURES Section VIII: Privacy and Security Identity Theft Policies, Identity Theft Red Flags and Address Discrepancy Identity Theft Policies Current Effective 2/1/16, 10/1/15 Date:
Facts About FACTA Red Flag Identity Theft Prevention Program
FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
RANDOLPH COUNTY PUBLIC WORKS. Identity Theft Prevention Program. Adopted September 1, 2009 Effective beginning September 1, 2009
RANDOLPH COUNTY PUBLIC WORKS Identity Theft Prevention Program Adopted September 1, 2009 Effective beginning September 1, 2009 I. PROGRAM ADOPTION The Randolph County Public Works Department ( the Department
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES
DMACC IDENTITY THEFT- RED FLAGS PROCEDURES This document contains identity theft red flag procedures for Des Moines Area Community College. Section Topic Page 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 XX PURPOSE
Identity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
II. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
MCPHS IDENTITY THEFT POLICY
SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only
Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule
IBN Financial Services, Inc. Identity Theft Prevention Program(ITPP) under the FTCFACTActRedFlagsRule I. Firm Policy Our firm s policy is to protect our customers and their accounts from identity theft
