SlideShare a Scribd company logo
1 of 5
Download to read offline
Identity theft: Could it happen in your office?
By Marty Krawczyk
Under new regulations, medical practices must take steps to prevent identity theft
The Federal Trade Commission (FTC) Red Flag Rules, which went into effect on November 1,
2008, are part of the government’s continuing efforts to curtail the rise in identity theft. The
Red Flag Rules apply to “creditors”—including physicians—and provide guidance for establishing
protocols to detect, prevent, and mitigate identity theft.
Recognizing that physicians and others might need additional time to comply with the specific
provision for developing and implementing a written identity theft prevention program, the FTC
has granted a 6-month “delay of enforcement”—until May 1, 2009—for this part of the rules
only. To avoid penalties for noncompliance, physicians and practice administrators should start
developing and implementing such a program now.

Why does this apply to you?
If you regularly extend, renew, or continue credit —that is, you don’t demand immediate
payment for medical goods and services—the FTC considers you a creditor. Furthermore, if your
patients have accounts with you, and the potential for identify theft exists, you are subject to
the Red Flag Rules.
the Red Flag Rules.
If you ask for credit reports on prospective patients, or if you issue credit or smart cards to
patients, you are also subject to the Rules. For example, the Rules require that if you receive a
change of address notice from a patient, you cannot issue a new card until you verify the
change of address.
What’s the risk?
In a healthcare setting such as a medical practice, a substantial amount of patient financial and
medical information is accessible to employees and other physician practices, hospitals, and
vendors. Medical identity theft occurs when someone uses another person’s name, insurance
information, or Social Security number (SSN) to obtain medical services or goods, or files false
insurance claims and falsifies medical records to support those claims.
Identity theft affects everyone and has a significant impact on patient care and safety. A
catastrophic event could result if the physician bases treatment on falsely provided medical
information. From an economic perspective, the cost of medical identity theft is huge and
growing.
What is an identity theft prevention program?
Although all identity theft prevention programs share certain characteristics (such as being
written documents), they vary in size and complexity depending on your practice, the scope of
its activities, and the potential risk for identity theft. For example, a solo practitioner in a rural
area who knows all of the residents of the community by sight would have a different program
than a 50-physician group practice in a large, urban setting.
If you already have policies and procedures in place to comply with the Health Information
Portability and Accountability Act, you can include them as part of your pro-gram, in addition to
any strategies you currently use to verify patient identity. The World Privacy Forum
( www.worldprivacyforum.org) has developed samples and information to help healthcare
providers understand and develop an identity theft prevention program. Be sure to have legal
counsel review the written document to ensure that you fully comply with all provisions of the
Red Flag Rules, including the following elements:
Assessing risk factors
Identifying “Red Flag” sources
Establishing procedures for detecting red flags
Training staff
Updating the program
Preventing and mitigating identity theft
Administering the program
Assessing risk factors
Assessing risk factors
The financial impact of identity theft can be substantial. A patient with stolen photo identification
and insurance cards may not be detected until treatment is completed and the real insured
patient is billed. For the financial stability of your practice, you and your practice executives
should carefully review your procedures and processes to identify points in the patient/practice
encounter where you can recognize identity theft and take appropriate action.
Your identity theft prevention program should include measures for protecting patient accounts
and financial information. You should identify the “red flags” that alert you to breaches in
security. Practices that use electronic medical records (EMR) systems can limit access to
sensitive financial information by implementing security parameters such as password protection
and audit trails. Securing access to financial information found in paper charts is much more
challenging.
Do not forget to assess the risk to your practice as well. Include red flags that can indicate
potential theft of practice-related information, including bank account numbers, signatures, tax
identification numbers, and the SSNs of physicians and staff.
Identifying red flag sources
If you have had prior experience with patient- or practice-related identity theft, you’ve probably
examined how it happened, what could have alerted the staff to it, and what should be done to
avoid a recurrence. This information can be the starting point for your identity theft prevention
program under the new rules.
First, identify points where the potential for false identity can occur, beginning with the new
patient intake process. Potential red flags that warrant action by staff include the following:
Do the patient’s identification documents appear altered or forged?
Are there inconsistencies between verbal and written (documented) information?
Is the patient’s SSN listed on the Social Security Administration’s Death Master Registry?
The guidelines also call for monitoring the security of existing accounts, such as your patient
financial records. For example, if a patient notifies you of a possible identity theft, you should
have policies and procedures in place to note this in the chart, EMR, and billing records.
Other possible sources for red flag activity include the failure to enforce password sharing rules,
and procedures for releasing medical records to the patient, hospitals, and other physicians.
Establishing procedures
Once you’ve identified potential red flags, you should document and establish procedures for
detecting them. For example, in your new patient intake process, you may develop a checklist
that prompts staff to ask for and provides guidelines for examining identifying information such
as a driver’s license, identification card, passport, or other government-issued photo
identification.
Some practices have begun asking patients for permission to take a photo that is added to the
patients’ medical records to aid staff in future identification. Photocopying the patient’s
identification may also be helpful.
You should also have policies and procedures for securing your practice’s financial information.
Limit access to information about the business side of the practice, including employee records
and salaries.
Training staff
Training is critical for an effective identity theft prevention program. Staff and physicians should
know what the red flags are and how to respond appropriately. They must understand the
seriousness and the impact of medical identity theft. Periodic training will keep everyone alert
and active in preventing potential liability and loss of practice revenue.
Updating the program
Methods of identity theft are constantly evolving. Review and update your program regularly.
New business arrangements (mergers, alliances, or changes in provider arrangements) should
trigger a review and update. Although the guidelines do not define how frequently you should
update your program, a quarterly review by practice physicians and staff would be beneficial.
Preventing and mitigating identity theft
If an identity theft situation occurs, you should have procedures in place for responding to the
breach in security. The detection of red flags or any unusual activity related to patient records
must be brought to the attention of a physician or senior level manager who can determine
what action to take. In some cases, for example, you might contact the patient directly, notify
law enforcement, close a patient record and create a new one, change passwords, and/or
change security codes to prevent future identity theft.
Administering the program
The responsibility for administering the program depends upon the legal entity of the practice.
For example, in an incorporated medical practice, the board of directors or executive committee
would be responsible; in a sole proprietorship, the physician or a senior level management
employee would be the administrator. Consult your legal advisor on this issue.
Avoid penalties by acting now
The new rules require you to have a written identity theft prevention program; under the Fair
Credit Reporting Act, you could face monetary penalties if you don’t comply. Because programs
are developed based on risk and flexibility, the FTC will determine whether you’ve made a good
faith effort to comply. From a practice management best practices standpoint, an identity theft
prevention program can protect both patients and the practice from significant harmful effects.
Marty Krawczyk, a practice management coordinator in the AAOS practice management group,
can be reached at krawczyk@aaos.org
Resources/Refernces:
1. The full text of the Final Red Flag Rules, Section 114 of the Fair and Accurate
Transactions Act (FACTA) http://www.fdic.gov/news/board/07Oct16nine.pdf
2. Consumer Identification Programs for Financial Transactions
http://www.privacyrights.org/fs/fs31-CIP.htm#A
3. Red Flag and Address Discrepancy Requirements: Suggestions for Health Care Providers.
The World Privacy Forum (September 24, 2008) http://www.worldprivacyforum.org/
AAOS Now
December 2008 Issue
http://www.aaos.org/news/aaosnow/dec08/managing5.asp

-PRIVACY POLICY- Disclaimers & Agreement Advertising & Sponsorship Contact AAOS Technical Requirements Careers
6300 North River Road Rosemont, Illinois 60018-4262 Phone 847.823.7186 Fax 847.823.8125
© 1995-2014 by the American Academy of Orthopaedic Surgeons. "All Rights Reserved." This website and its contents may not be reproduced in whole
or in part without written permission. "American Academy of Orthopaedic Surgeons" and its associated seal and "American Association of Orthopaedic
Surgeons" and its logo are all registered U.S. trademarks and may not be used without written permission.

More Related Content

What's hot

Insurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsInsurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsOutsource Strategies International
 
Understanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity TheftUnderstanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity Theft- Mark - Fullbright
 
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery BoardHIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery BoardAtlantic Training, LLC.
 
Ama prepare that claim taking an active approch to the claims management re...
Ama prepare that claim   taking an active approch to the claims management re...Ama prepare that claim   taking an active approch to the claims management re...
Ama prepare that claim taking an active approch to the claims management re...Rajinikanth Dhakshanamurthi
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Provider Credentialing Services
Provider Credentialing ServicesProvider Credentialing Services
Provider Credentialing Servicestalisman1
 
Developing a Practice Compliance Plan
Developing a Practice Compliance PlanDeveloping a Practice Compliance Plan
Developing a Practice Compliance Planshelvan1967
 
Medical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajMedical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajSidhantloveraj
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inserviceKelly Snyder
 
Revenue cycle rcm
Revenue cycle   rcmRevenue cycle   rcm
Revenue cycle rcmCognizant
 
Medical billing training in Hyderabad
Medical billing training in HyderabadMedical billing training in Hyderabad
Medical billing training in HyderabadAccuprosys
 
Healthcare Revenue Integrity Strategies
Healthcare Revenue Integrity StrategiesHealthcare Revenue Integrity Strategies
Healthcare Revenue Integrity Strategieskarthik Venkilot
 
Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)William Copeland
 
Preventing Provider Medical Identity Theft
Preventing Provider Medical Identity TheftPreventing Provider Medical Identity Theft
Preventing Provider Medical Identity Theft- Mark - Fullbright
 
Electronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case ManagementElectronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case ManagementDavid Martin
 

What's hot (18)

Insurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsInsurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denials
 
Understanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity TheftUnderstanding and Preventing Provider Medical Identity Theft
Understanding and Preventing Provider Medical Identity Theft
 
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery BoardHIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
HIPAA Workforce Training by Wayne-Holmes Mental Health Recovery Board
 
Ama prepare that claim taking an active approch to the claims management re...
Ama prepare that claim   taking an active approch to the claims management re...Ama prepare that claim   taking an active approch to the claims management re...
Ama prepare that claim taking an active approch to the claims management re...
 
Basic HIPAA Training by CMU
Basic HIPAA Training by CMUBasic HIPAA Training by CMU
Basic HIPAA Training by CMU
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Provider Credentialing Services
Provider Credentialing ServicesProvider Credentialing Services
Provider Credentialing Services
 
Developing a Practice Compliance Plan
Developing a Practice Compliance PlanDeveloping a Practice Compliance Plan
Developing a Practice Compliance Plan
 
Credentialing
CredentialingCredentialing
Credentialing
 
Medical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajMedical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant Raj
 
Hipaa inservice
Hipaa inserviceHipaa inservice
Hipaa inservice
 
Revenue cycle rcm
Revenue cycle   rcmRevenue cycle   rcm
Revenue cycle rcm
 
Medical billing training in Hyderabad
Medical billing training in HyderabadMedical billing training in Hyderabad
Medical billing training in Hyderabad
 
Healthcare Revenue Integrity Strategies
Healthcare Revenue Integrity StrategiesHealthcare Revenue Integrity Strategies
Healthcare Revenue Integrity Strategies
 
Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)Fellow Ais 4 Laws Regs & Ethics (Revised)
Fellow Ais 4 Laws Regs & Ethics (Revised)
 
Medical billing policy procedure guide
Medical billing policy  procedure guideMedical billing policy  procedure guide
Medical billing policy procedure guide
 
Preventing Provider Medical Identity Theft
Preventing Provider Medical Identity TheftPreventing Provider Medical Identity Theft
Preventing Provider Medical Identity Theft
 
Electronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case ManagementElectronic Health Records Integration with Corrections Case Management
Electronic Health Records Integration with Corrections Case Management
 

Viewers also liked

Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name- Mark - Fullbright
 
Cross-border investigations: Are you prepared for the challenge
Cross-border investigations: Are you prepared for the challengeCross-border investigations: Are you prepared for the challenge
Cross-border investigations: Are you prepared for the challenge- Mark - Fullbright
 
Have a complaint about your bank
Have a complaint about your bankHave a complaint about your bank
Have a complaint about your bank- Mark - Fullbright
 
Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609- Mark - Fullbright
 

Viewers also liked (7)

Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
State Credit Freeze Chart
State Credit Freeze ChartState Credit Freeze Chart
State Credit Freeze Chart
 
ID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good NameID Theft - When Bad Things Happen to Your Good Name
ID Theft - When Bad Things Happen to Your Good Name
 
Cross-border investigations: Are you prepared for the challenge
Cross-border investigations: Are you prepared for the challengeCross-border investigations: Are you prepared for the challenge
Cross-border investigations: Are you prepared for the challenge
 
Resources for Mobiles
Resources for MobilesResources for Mobiles
Resources for Mobiles
 
Have a complaint about your bank
Have a complaint about your bankHave a complaint about your bank
Have a complaint about your bank
 
Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609Instructions For Law Enforcement Submitting Request Under FCRA Section 609
Instructions For Law Enforcement Submitting Request Under FCRA Section 609
 

Similar to Identity theft: Could it happen in your office?

Current Procedural Terminology
Current Procedural TerminologyCurrent Procedural Terminology
Current Procedural TerminologyCarolina Lewis
 
Top 5 Challenges Faced by Medical Billing Services and How to Overcome Them
Top 5 Challenges Faced by Medical Billing Services and How to Overcome ThemTop 5 Challenges Faced by Medical Billing Services and How to Overcome Them
Top 5 Challenges Faced by Medical Billing Services and How to Overcome ThemOmniMD Healthcare
 
Lisa Hancock, RN, MHA
Lisa Hancock, RN, MHALisa Hancock, RN, MHA
Lisa Hancock, RN, MHALisa Hancock
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And PrivacyScott Fikes
 
Understanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdfUnderstanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdfCosentus
 
Optimize Revenue Cycle Operations to Improve Claims Management and Reimbursement
Optimize Revenue Cycle Operations to Improve Claims Management and ReimbursementOptimize Revenue Cycle Operations to Improve Claims Management and Reimbursement
Optimize Revenue Cycle Operations to Improve Claims Management and ReimbursementOutsource Strategies International
 
Medical Billing Alert – Take Measure to Avoid Charges of Fraud
Medical Billing Alert – Take Measure to Avoid Charges of FraudMedical Billing Alert – Take Measure to Avoid Charges of Fraud
Medical Billing Alert – Take Measure to Avoid Charges of FraudOutsource Strategies International
 
Common Revenue Cycle Management Challenges and How to Overcome Them
Common Revenue Cycle Management Challenges and How to Overcome ThemCommon Revenue Cycle Management Challenges and How to Overcome Them
Common Revenue Cycle Management Challenges and How to Overcome ThemOutsource Strategies International
 
Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...
Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...
Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...Health 2Conf
 
Overcoming Substance Abuse Treatment Billing Challenges PDF.pdf
Overcoming Substance Abuse Treatment Billing Challenges PDF.pdfOvercoming Substance Abuse Treatment Billing Challenges PDF.pdf
Overcoming Substance Abuse Treatment Billing Challenges PDF.pdfDevinclark22
 
Urgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR ServicesUrgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR Serviceseverestar
 
Top Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptxTop Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptxalicecarlos1
 
Compliance and confidentiality
Compliance and confidentialityCompliance and confidentiality
Compliance and confidentialitykmaney17
 
Health Care Technology Trends for 2023
Health Care Technology Trends for 2023Health Care Technology Trends for 2023
Health Care Technology Trends for 2023EyeCareLeaders1
 
medi-lynx letterhead
medi-lynx letterheadmedi-lynx letterhead
medi-lynx letterheadAndre Bayards
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...Health 2Conf
 
The funding and reimbursement aspects of health care delivery are co.docx
The funding and reimbursement aspects of health care delivery are co.docxThe funding and reimbursement aspects of health care delivery are co.docx
The funding and reimbursement aspects of health care delivery are co.docxSUBHI7
 
Best Practices for Denial Management in Healthcare RCM.ppt
Best Practices for Denial Management in Healthcare RCM.pptBest Practices for Denial Management in Healthcare RCM.ppt
Best Practices for Denial Management in Healthcare RCM.pptMatthew Clark
 
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptxDanny Johnsmith
 
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdfDanny Johnsmith
 

Similar to Identity theft: Could it happen in your office? (20)

Current Procedural Terminology
Current Procedural TerminologyCurrent Procedural Terminology
Current Procedural Terminology
 
Top 5 Challenges Faced by Medical Billing Services and How to Overcome Them
Top 5 Challenges Faced by Medical Billing Services and How to Overcome ThemTop 5 Challenges Faced by Medical Billing Services and How to Overcome Them
Top 5 Challenges Faced by Medical Billing Services and How to Overcome Them
 
Lisa Hancock, RN, MHA
Lisa Hancock, RN, MHALisa Hancock, RN, MHA
Lisa Hancock, RN, MHA
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And Privacy
 
Understanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdfUnderstanding and Overcoming Medical Billing Denials.pdf
Understanding and Overcoming Medical Billing Denials.pdf
 
Optimize Revenue Cycle Operations to Improve Claims Management and Reimbursement
Optimize Revenue Cycle Operations to Improve Claims Management and ReimbursementOptimize Revenue Cycle Operations to Improve Claims Management and Reimbursement
Optimize Revenue Cycle Operations to Improve Claims Management and Reimbursement
 
Medical Billing Alert – Take Measure to Avoid Charges of Fraud
Medical Billing Alert – Take Measure to Avoid Charges of FraudMedical Billing Alert – Take Measure to Avoid Charges of Fraud
Medical Billing Alert – Take Measure to Avoid Charges of Fraud
 
Common Revenue Cycle Management Challenges and How to Overcome Them
Common Revenue Cycle Management Challenges and How to Overcome ThemCommon Revenue Cycle Management Challenges and How to Overcome Them
Common Revenue Cycle Management Challenges and How to Overcome Them
 
Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...
Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...
Health 2.0 Conference Shares Tips For Preventing Fraud & Abuse In The Healthc...
 
Overcoming Substance Abuse Treatment Billing Challenges PDF.pdf
Overcoming Substance Abuse Treatment Billing Challenges PDF.pdfOvercoming Substance Abuse Treatment Billing Challenges PDF.pdf
Overcoming Substance Abuse Treatment Billing Challenges PDF.pdf
 
Urgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR ServicesUrgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR Services
 
Top Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptxTop Goals for Physicians to Implement In Their Facility.pptx
Top Goals for Physicians to Implement In Their Facility.pptx
 
Compliance and confidentiality
Compliance and confidentialityCompliance and confidentiality
Compliance and confidentiality
 
Health Care Technology Trends for 2023
Health Care Technology Trends for 2023Health Care Technology Trends for 2023
Health Care Technology Trends for 2023
 
medi-lynx letterhead
medi-lynx letterheadmedi-lynx letterhead
medi-lynx letterhead
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 
The funding and reimbursement aspects of health care delivery are co.docx
The funding and reimbursement aspects of health care delivery are co.docxThe funding and reimbursement aspects of health care delivery are co.docx
The funding and reimbursement aspects of health care delivery are co.docx
 
Best Practices for Denial Management in Healthcare RCM.ppt
Best Practices for Denial Management in Healthcare RCM.pptBest Practices for Denial Management in Healthcare RCM.ppt
Best Practices for Denial Management in Healthcare RCM.ppt
 
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pptx
 
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf
3 Easy Tips To Improve Revenue For Chiropractic Billing Services.pdf
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

Identity theft: Could it happen in your office?

  • 1. Identity theft: Could it happen in your office? By Marty Krawczyk Under new regulations, medical practices must take steps to prevent identity theft The Federal Trade Commission (FTC) Red Flag Rules, which went into effect on November 1, 2008, are part of the government’s continuing efforts to curtail the rise in identity theft. The Red Flag Rules apply to “creditors”—including physicians—and provide guidance for establishing protocols to detect, prevent, and mitigate identity theft. Recognizing that physicians and others might need additional time to comply with the specific provision for developing and implementing a written identity theft prevention program, the FTC has granted a 6-month “delay of enforcement”—until May 1, 2009—for this part of the rules only. To avoid penalties for noncompliance, physicians and practice administrators should start developing and implementing such a program now. Why does this apply to you? If you regularly extend, renew, or continue credit —that is, you don’t demand immediate payment for medical goods and services—the FTC considers you a creditor. Furthermore, if your patients have accounts with you, and the potential for identify theft exists, you are subject to the Red Flag Rules.
  • 2. the Red Flag Rules. If you ask for credit reports on prospective patients, or if you issue credit or smart cards to patients, you are also subject to the Rules. For example, the Rules require that if you receive a change of address notice from a patient, you cannot issue a new card until you verify the change of address. What’s the risk? In a healthcare setting such as a medical practice, a substantial amount of patient financial and medical information is accessible to employees and other physician practices, hospitals, and vendors. Medical identity theft occurs when someone uses another person’s name, insurance information, or Social Security number (SSN) to obtain medical services or goods, or files false insurance claims and falsifies medical records to support those claims. Identity theft affects everyone and has a significant impact on patient care and safety. A catastrophic event could result if the physician bases treatment on falsely provided medical information. From an economic perspective, the cost of medical identity theft is huge and growing. What is an identity theft prevention program? Although all identity theft prevention programs share certain characteristics (such as being written documents), they vary in size and complexity depending on your practice, the scope of its activities, and the potential risk for identity theft. For example, a solo practitioner in a rural area who knows all of the residents of the community by sight would have a different program than a 50-physician group practice in a large, urban setting. If you already have policies and procedures in place to comply with the Health Information Portability and Accountability Act, you can include them as part of your pro-gram, in addition to any strategies you currently use to verify patient identity. The World Privacy Forum ( www.worldprivacyforum.org) has developed samples and information to help healthcare providers understand and develop an identity theft prevention program. Be sure to have legal counsel review the written document to ensure that you fully comply with all provisions of the Red Flag Rules, including the following elements: Assessing risk factors Identifying “Red Flag” sources Establishing procedures for detecting red flags Training staff Updating the program Preventing and mitigating identity theft Administering the program Assessing risk factors
  • 3. Assessing risk factors The financial impact of identity theft can be substantial. A patient with stolen photo identification and insurance cards may not be detected until treatment is completed and the real insured patient is billed. For the financial stability of your practice, you and your practice executives should carefully review your procedures and processes to identify points in the patient/practice encounter where you can recognize identity theft and take appropriate action. Your identity theft prevention program should include measures for protecting patient accounts and financial information. You should identify the “red flags” that alert you to breaches in security. Practices that use electronic medical records (EMR) systems can limit access to sensitive financial information by implementing security parameters such as password protection and audit trails. Securing access to financial information found in paper charts is much more challenging. Do not forget to assess the risk to your practice as well. Include red flags that can indicate potential theft of practice-related information, including bank account numbers, signatures, tax identification numbers, and the SSNs of physicians and staff. Identifying red flag sources If you have had prior experience with patient- or practice-related identity theft, you’ve probably examined how it happened, what could have alerted the staff to it, and what should be done to avoid a recurrence. This information can be the starting point for your identity theft prevention program under the new rules. First, identify points where the potential for false identity can occur, beginning with the new patient intake process. Potential red flags that warrant action by staff include the following: Do the patient’s identification documents appear altered or forged? Are there inconsistencies between verbal and written (documented) information? Is the patient’s SSN listed on the Social Security Administration’s Death Master Registry? The guidelines also call for monitoring the security of existing accounts, such as your patient financial records. For example, if a patient notifies you of a possible identity theft, you should have policies and procedures in place to note this in the chart, EMR, and billing records. Other possible sources for red flag activity include the failure to enforce password sharing rules, and procedures for releasing medical records to the patient, hospitals, and other physicians. Establishing procedures Once you’ve identified potential red flags, you should document and establish procedures for detecting them. For example, in your new patient intake process, you may develop a checklist that prompts staff to ask for and provides guidelines for examining identifying information such as a driver’s license, identification card, passport, or other government-issued photo identification.
  • 4. Some practices have begun asking patients for permission to take a photo that is added to the patients’ medical records to aid staff in future identification. Photocopying the patient’s identification may also be helpful. You should also have policies and procedures for securing your practice’s financial information. Limit access to information about the business side of the practice, including employee records and salaries. Training staff Training is critical for an effective identity theft prevention program. Staff and physicians should know what the red flags are and how to respond appropriately. They must understand the seriousness and the impact of medical identity theft. Periodic training will keep everyone alert and active in preventing potential liability and loss of practice revenue. Updating the program Methods of identity theft are constantly evolving. Review and update your program regularly. New business arrangements (mergers, alliances, or changes in provider arrangements) should trigger a review and update. Although the guidelines do not define how frequently you should update your program, a quarterly review by practice physicians and staff would be beneficial. Preventing and mitigating identity theft If an identity theft situation occurs, you should have procedures in place for responding to the breach in security. The detection of red flags or any unusual activity related to patient records must be brought to the attention of a physician or senior level manager who can determine what action to take. In some cases, for example, you might contact the patient directly, notify law enforcement, close a patient record and create a new one, change passwords, and/or change security codes to prevent future identity theft. Administering the program The responsibility for administering the program depends upon the legal entity of the practice. For example, in an incorporated medical practice, the board of directors or executive committee would be responsible; in a sole proprietorship, the physician or a senior level management employee would be the administrator. Consult your legal advisor on this issue. Avoid penalties by acting now The new rules require you to have a written identity theft prevention program; under the Fair Credit Reporting Act, you could face monetary penalties if you don’t comply. Because programs are developed based on risk and flexibility, the FTC will determine whether you’ve made a good faith effort to comply. From a practice management best practices standpoint, an identity theft prevention program can protect both patients and the practice from significant harmful effects. Marty Krawczyk, a practice management coordinator in the AAOS practice management group, can be reached at krawczyk@aaos.org
  • 5. Resources/Refernces: 1. The full text of the Final Red Flag Rules, Section 114 of the Fair and Accurate Transactions Act (FACTA) http://www.fdic.gov/news/board/07Oct16nine.pdf 2. Consumer Identification Programs for Financial Transactions http://www.privacyrights.org/fs/fs31-CIP.htm#A 3. Red Flag and Address Discrepancy Requirements: Suggestions for Health Care Providers. The World Privacy Forum (September 24, 2008) http://www.worldprivacyforum.org/ AAOS Now December 2008 Issue http://www.aaos.org/news/aaosnow/dec08/managing5.asp -PRIVACY POLICY- Disclaimers & Agreement Advertising & Sponsorship Contact AAOS Technical Requirements Careers 6300 North River Road Rosemont, Illinois 60018-4262 Phone 847.823.7186 Fax 847.823.8125 © 1995-2014 by the American Academy of Orthopaedic Surgeons. "All Rights Reserved." This website and its contents may not be reproduced in whole or in part without written permission. "American Academy of Orthopaedic Surgeons" and its associated seal and "American Association of Orthopaedic Surgeons" and its logo are all registered U.S. trademarks and may not be used without written permission.