SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: Bonefish who wrote (954231)8/5/2016 11:20:11 AM
From: TideGlider  Read Replies (2) | Respond to of 1575840
 
Medical Identity Theft: The "Red Flags" Rule

Ads
  • HIPAA Security Rule
  • Identity Theft Insurance
  • Credit Card Fraud Alert
  • Patient Medical Care
  • Medical Office Manager




  • Image courtesy of LWS/Getty Images




    By Joy Hicks
    Medical Office Expert







    Share










    Pin














    Tweet



    Submit



    Stumble



    Post



    Share





    By Joy Hicks

    Updated October 29, 2015.
    The health care industry is not exempt from the consequences of identity theft. Medical identity theft occurs when someone presents someone else's name or insurance information for the purpose of receiving health care.

    According to the Federal Trade Commission (FTC), close to 5% of incidents involving identity theft are in the form of medical identity theft. The damages of medical identity theft can be devastating to both the victim and the health care provider.

    Victims of medical identity theft can find themselves left with incorrect information in their medical record and expenses they never incurred. Health care providers may be left with a large amount of unpaid bills.

    On August 1, 2009, the FTC began to enforce a the Red Flags Rule requiring businesses including health care providers to develop a program to spot the "red flags" of identity theft. Under the Red Flags Rule, organizations are required to develop a process to identify, detect, and prevent identity theft.

    continue reading below our video

    5 Steps to Starting Your Own Business

    Play Video

    Play

    Mute

    Current Time 0:10

    /

    Duration Time 3:48

    Loaded: 0%

    Progress: 0%

    Stream TypeLIVE

    Remaining Time -3:37




    Playback Rate
    1

    Chapters
    Chapters

    descriptions off, selected
    Descriptions

    subtitles off, selected
    Subtitles

    captions settings, opens captions settings dialogcaptions off, selected
    Captions

    default, selected

    Fullscreen

    This is a modal window.

    Close
    This is a modal window. This modal can be closed by pressing the Escape key or activating the close button.

    Play

    Mute

    Current Time 0:00

    /

    Duration Time 0:00

    Loaded: 0%

    Progress: 0%

    Stream TypeLIVE

    Remaining Time -0:00




    Playback Rate
    1

    Chapters
    Chapters

    descriptions off, selected
    Descriptions

    subtitles off, selected
    Subtitles

    captions settings, opens captions settings dialogcaptions off, selected
    Captions



    Fullscreen

    Foreground--- White Black Red Green Blue Yellow Magenta Cyan --- Opaque Semi-Opaque

    Background--- White Black Red Green Blue Yellow Magenta Cyan --- Opaque Semi-Transparent Transparent

    Window--- White Black Red Green Blue Yellow Magenta Cyan --- Opaque Semi-Transparent Transparent



    Font Size50% 75% 100% 125% 150% 175% 200% 300% 400%

    Text Edge StyleNone Raised Depressed Uniform Dropshadow

    Font FamilyDefault Monospace Serif Proportional Serif Monospace Sans-Serif Proportional Sans-Serif Casual Script Small Caps


    Defaults Done





    The FTC also advises organizations to keep their Red Flags program current.

    When implementing your program, keep these in mind.

    • Identify: Be alert for suspicious documents or personal identifying information that appear to be altered or are inconsistent when compared to other information provided by the customer.
    • Detect: Obtain and verify identification when making changes to account information.
    • Prevent: When the risk of identity theft is suspected, take steps to prevent further incident.
    • Update: Periodically evaluate your program and make necessary changes.
    If it is brought to your attention that your patient may be a victim of identity theft, there are several things that the medical office can do.

    1. View the medical records to identify any inconsistencies in the patient chart when compared to other dates of service. Verify the identification cards received and compare them against each other. If the patient's height or weight do not match or any other identifying characteristics, this is a clue that there may be foul play. Be sure to remove the incorrect information from the patient's account including diagnosis, procedures and charges to ensure accuracy.
    2. For any debts associated with the identity theft, you may not report this debt to credit reporting companies. Medical identity theft should be reported to the police.
    3. Ensure your data security practices are compliant with the information safeguard provisions of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules. Patient information should be secured and protected from data breaches.
    4. If a breach occurs, be sure to notify patients of the data breach as required by the HIPAA Breach Notification Rule or as mandated by state law.
    It is very important to get a copy of a patient's insurance and identification cards each and every time they present for services. This will help to prevent instances of fraud.




    Show Full Article


    Related