FY13 Core Training. Click next to continue



Similar documents
RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

Identity Theft Prevention & Detection Red Flags Rule Compliance Policy Procedures I. Identify red flags.

IDENTITY THEFT DETECTION POLICY

Physician Office Compliance with the Red Flag Rule

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

Facts About FACTA Red Flag Identity Theft Prevention Program

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Identity Theft Prevention Program

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

Z1.01 Guideline: Identity Theft Prevention Program

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft

HOME DEPOT DATA BREACH

Ouachita Baptist University. Identity Theft Policy and Program

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

University Policy: Identity Theft Prevention Policy

II. F. Identity Theft Prevention

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

University of Alaska. Identity Theft Prevention Program

ACCG Identity Theft Prevention Program. ACCG 50 Hurt Plaza, Suite 1000 Atlanta, Georgia (404) (404)

Florida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009

Tips for Submitting Supporting Documents to the Health Insurance Marketplace Center for Consumer Information and Insurance Oversight (CCIIO)

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

Red Flag Rules Information and Training

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

IDENTITY THEFT AND MUNICIPAL UTILITIES

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

Prepared by Sgt. Gibbs, Thomas B

City of Hercules Hercules Municipal Utility Identity Theft Prevention Program

NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

POLICY TITLE: IDENTITY THEFT PROTECTION POLICY

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

Identity Theft Victim Checklist

Number: Index

The Home Depot Provides Update on Breach Investigation

IDENTITY THEFT PROCEDURES

Transcription:

Identity Theft Prevention Program FY13 Core Training Click next to continue

Course Information Course Title: Regulations/Standards: Approximate Time to Complete: Intended Audience: Identity Theft Prevention Program Federal Trade Commission (FTC) Identity Theft Training Requirements 15 minutes All LVHN employed staff Technical Specifications: Flash player 9. Internet Explorer 6. Date Revised: August 2012 Contact Information Please forward any content questions or concerns to the Subject Matter Expert: Carol Kriebel at 610-969-0501 Please call the Help Desk at 610-402-8303 with any technical issues. This course does not contain audio.

Objectives Upon completion of this course, you should be able to: Explain the purpose p of the LVHN Identity Theft Program Define medical identity theft List three consequences of identity theft List precautions that individuals can take to avoid identity theft Identify the appropriate information that should be obtained to verify patient identity and four acceptable forms of identification Identify the four categories of red flags for identity theft in healthcare Are you ready to test your knowledge? To test your knowledge, you can click the Demonstrate Knowledge button to move to the final test.

Purpose In January 2008, the Federal Trade Commission (FTC) issued a set of regulations requiring certain organizations to develop a written program to spot the warning signs or red flags of identity theft. The purpose of the Identity Theft Prevention Program at Lehigh Valley Health Network is to detect, prevent, decrease, and respond to identity theft. The Identity Theft Prevention Program looks for potential cases of identity theft by assessing patterns, practices and actions - these are the red flags of identity theft. LVHN s Identity Theft Prevention Program follows the guidelines issued by the FTC and the Fair and Accurate Credit Transactions (FACT) act. Click here to review the Identity Theft Prevention Program

What is Identity Theft? Identity Theft: Fraud committed or attempted using the identifying information of another person. Identity theft can cause severe consequences for its victims. Identity theft can be broken down into sub-categories: 1. Financial Identity Theft 2. Medical Identity Theft According to the FTC, identity theft is the # 1 consumer complaint.

Medical Identity Theft The World Privacy Organization defines medical identity theft as theft that occurs when someone uses another person s person s name and other parts of their identity (such as insurance information or social security number) without the victim s knowledge or consent to: Receive medical services or goods Make false claims for money In the process, false information is added to the victim s medical record.

Consequences of Identity Theft Mr. Miller is the unknowing victim of medical identity theft. Claims have been submitted in his name for procedures that he never had. How do you think this will impact Mr. Miller? Consequences Click the button to learn more about the consequences of medical identity theft.

Consequences of Identity Theft Because false claims have been submitted in Mr. Miller s name, his medical record shows information that is false. Identity theft can impact: Insurance Coverage Medical Care Credit and Finances As a result Mr. Miller could: Be denied insurance coverage Receive unsafe medical care and false diagnoses Have credit and financial problems

Avoiding Identity Theft Take these precautions to protect yourself: Share personal health information only with trusted providers Review the Explanation of Benefits to monitor claims submitted in your name Request an annual summary of benefits paid from the insurer Review your credit history

Steps LVHN Has Taken To help prevent identity theft, LVHN has: Established a verification process Minimized the use of social security numbers Created safeguards for all identifiable health information Implemented procedures for the disposal and destruction of health information

Why is the Program Important? The LVHN Identity Theft Prevention Program is important because it is required by the government. The Federal Trade Commission (FTC) requires a written program to spot the warning signs of identity theft. The program also benefits the Network. By having an Identity Theft Prevention Program, LVHN is able to quickly identify and correct any potential identity theft risks.

Red Flags

Suspicious Documents

Suspicious Identifying Information

Suspicious Activity to an Account

Alerts From Others

Patient Verification To help prevent identity theft, LVHN has implemented a verification process for both new and existing patients. Obtain the appropriate demographic and insurance information from your patient. This includes: Full name Date of birth Address Social Security Number Photo ID/Driver s License Insurance card You should also verify electronic insurance You should also verify electronic insurance eligibility for all carriers.

Acceptable Forms of Identification Acceptable forms of identification include: Driver s License Birth Certificate Passport Military ID Social Security Card School ID Work ID Permanent Residence Card (Green Card) Voter Registration Card If you have any concerns or questions regarding a patient s identity, ask for a second form of identification to verify the patient s identity.

If You Suspect Identity Theft When you suspect identity theft: 1 Gather information DO NOT confront the patient t 2 Provide Care NEVER turn a patient away! 3 Notify your supervisor/manager 4 Notify Security (610-402-8220) and provide: Name Medical record number Account number (when applicable) 5 Complete a Patient Safety Report Click the icon on your SSO Toolbar

Ready to Test Your Knowledge? You should now be able to: Explain the purpose of the LVHN Identity Theft Program Define medical identity theft List three consequences of identity theft List precautions that individuals can take to avoid identity theft Identify the appropriate information that should be obtained to verify patient identity and four acceptable forms of identification Identify the four categories of red flags for identity theft in healthcare If you are ready to take the final test, click the test button below. You must earn a score of at least 80% to successfully complete the course.