19.11.2014 Views

Understanding the Red Flag Rules - Log in - American Health ...

Understanding the Red Flag Rules - Log in - American Health ...

Understanding the Red Flag Rules - Log in - American Health ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Program Requirements 1 XXX Response 2<br />

Staff Tra<strong>in</strong><strong>in</strong>g and<br />

Education<br />

Medical Identity Theft has been a part of <strong>the</strong> Organization’s Privacy and Security<br />

Tra<strong>in</strong><strong>in</strong>g Sessions and is covered as follows:<br />

• Covered <strong>in</strong> All Staff Privacy and Security General Orientation CBT<br />

(Verification of Identity; Risk Assessments – Threats; Security Incidents).<br />

• Component of New Leadership Orientation, Privacy and Security<br />

Component (updated annually).<br />

Upon Approval of Program<br />

• Computer Based Tra<strong>in</strong><strong>in</strong>g (CBT) Education for Local Compliance Officers,<br />

Privacy Officers, and Security Officers.<br />

• CBT/O<strong>the</strong>r Education for Patient F<strong>in</strong>ancial and Registration Leadership and<br />

Staff.<br />

• Newsletter Article for All XXX Workforce Members.<br />

2. Ongo<strong>in</strong>g Program Evaluation: The Program Manager shall periodically evaluate and update <strong>the</strong><br />

Program to reflect changes <strong>in</strong> risks to patients or to <strong>the</strong> <strong>in</strong>tegrity of <strong>the</strong> Organization’s operations based<br />

on <strong>the</strong> follow<strong>in</strong>g:<br />

A. Actual experiences with identity <strong>the</strong>ft.<br />

B. Industry trends <strong>in</strong> healthcare identity <strong>the</strong>ft.<br />

C. Evolv<strong>in</strong>g <strong>in</strong>dustry best practices.<br />

D. Changes <strong>in</strong> <strong>the</strong> methods used to carry out identity <strong>the</strong>ft.<br />

E. Changes <strong>in</strong> <strong>the</strong> types of accounts that <strong>the</strong> Organization offers.<br />

F. Changes <strong>in</strong> bus<strong>in</strong>ess arrangements, <strong>in</strong>clud<strong>in</strong>g mergers, acquisitions, alliances, jo<strong>in</strong>t ventures,<br />

and bus<strong>in</strong>ess associates.<br />

3. Bus<strong>in</strong>ess Associates/Service Providers: When <strong>the</strong> organization engages a bus<strong>in</strong>ess associate, service<br />

provider, and/or vendor to perform an activity <strong>in</strong> connection with one or more Covered Accounts, <strong>the</strong><br />

entity shall provide assurances that it is conduct<strong>in</strong>g bus<strong>in</strong>ess <strong>in</strong> accordance with reasonable policies and<br />

procedures designed to detect, prevent, and mitigate <strong>the</strong> risk of identity <strong>the</strong>ft. A HIPAA-compliance<br />

bus<strong>in</strong>ess associate agreement shall be obta<strong>in</strong>ed as part of <strong>the</strong> contract<strong>in</strong>g process.<br />

4. Regulatory Enforcement: Although <strong>the</strong> Federal Trade Commission (FTC) enabl<strong>in</strong>g act does not give<br />

<strong>the</strong> FTC direct jurisdiction over non-profit entities, <strong>the</strong> FTC has adopted a consistent and long-stand<strong>in</strong>g<br />

position that <strong>the</strong>y have <strong>the</strong> power to regulate non-profit entities when <strong>the</strong> non-profit entities engage <strong>in</strong><br />

activities similar to those conducted by for-profit entities. Accord<strong>in</strong>gly, <strong>the</strong> FTC has publically stated<br />

that it <strong>in</strong>tends to apply <strong>the</strong> <strong>Red</strong> <strong>Flag</strong> <strong>Rules</strong> to non-profits and governmental entities as well as to forprofit<br />

entities.<br />

5. Approval of Program: The Identity Theft Prevention Program shall be approved as follows:<br />

A. Support<strong>in</strong>g Policy PV-33: Vice President of Mission and Culture.<br />

B. Program: XXX Board of Directors.<br />

6. Delegated Authority for Program Changes: By approv<strong>in</strong>g this Program, <strong>the</strong> XXX Board of Directors<br />

has delegated authority to make future revisions to this Program to <strong>the</strong> Vice President of Mission and<br />

Culture.<br />

7. Notice of Unauthorized Acquisition of Personal Information: Subject to <strong>the</strong> provisions conta<strong>in</strong>ed <strong>in</strong><br />

Wis. Stat. §134.98, upon discover<strong>in</strong>g that an unauthorized <strong>in</strong>dividual has acquired Personal Information<br />

© Copyright 2009 Nancy Davis and Chrisann Lemery Sample Plan/Policy – Identity Theft Prevention Program<br />

Page 4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!