19.11.2014 Views

Understanding the Red Flag Rules - Log in - American Health ...

Understanding the Red Flag Rules - Log in - American Health ...

Understanding the Red Flag Rules - Log in - American Health ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Key Words: Identity, Prevention, Program, <strong>Red</strong> <strong>Flag</strong> <strong>Rules</strong>, Theft.<br />

Applicable Standards:<br />

• Jo<strong>in</strong>t Commission Standard IM.2.10.<br />

• Jo<strong>in</strong>t Commission Standard IM.2.20.<br />

Applicable Federal/State Regulations:<br />

• Fair Credit Report<strong>in</strong>g Act of 1970, 15 U.S.C. 1681 et. seq.<br />

• Fair and Accurate Credit Transactions Act of 2003, 15 U.S.C. 1681m(e) and 15 U.S.C. 1681c(h).<br />

• Identity Theft <strong>Red</strong> <strong>Flag</strong>s and Address Discrepancies Under <strong>the</strong> Fair and Accurate Credit Transactions<br />

Act of 2003 Regulations, 16 C.F.R. 681.<br />

• Notice of Unauthorized Use of Personal Identify<strong>in</strong>g Information, Wis. Stats. §134.98.<br />

For More Information Contact:<br />

• Vice President, XXX<br />

• Privacy Officer<br />

• Security Officer<br />

Responsible Senior Leader: Vice President, XXX<br />

Board of Directors Approval: December, 2008<br />

Consulted With: XXX Legal Counsel<br />

Sources<br />

• “<strong>Red</strong> <strong>Flag</strong> and Address Discrepancy Requirements: Suggestions for <strong>Health</strong> Care Providers,” The World<br />

Privacy Forum, September 24, 2008.<br />

• “<strong>Red</strong> <strong>Flag</strong> <strong>Rules</strong> FAQ,” Kroll Fraud Solutions, September, 2008.<br />

• “<strong>Health</strong> Care Providers: Don’t Miss <strong>the</strong> <strong>Red</strong> <strong>Flag</strong>s,” <strong>Health</strong> Law Advisory Bullet<strong>in</strong>, Davis, Wright,<br />

Trema<strong>in</strong>e, LLP, August, 2008.<br />

• “Compliance Deadl<strong>in</strong>e for FTC’s Identity Theft Provision Fast Approach<strong>in</strong>g,” AHA News, Vol. 44, No.<br />

18, September 1, 2008.<br />

Notice:<br />

This <strong>in</strong>formation is an accurate statement of published XXX Policy as of <strong>the</strong> time of publication. Permission is<br />

granted to electronically copy and to pr<strong>in</strong>t <strong>in</strong> hard copy for <strong>in</strong>ternal use only. No part of this <strong>in</strong>formation may be<br />

reproduced, modified, or redistributed <strong>in</strong> any form or by any means, for any purposes o<strong>the</strong>r than those noted<br />

above without permission of <strong>the</strong> Responsible System Leader. XXX adopts <strong>the</strong> Policy and recommends that <strong>the</strong><br />

user always check for <strong>the</strong> latest version on Our XXX, <strong>the</strong> XXX Intranet site before any subsequent use. XXX<br />

may make changes to <strong>the</strong> Policy without notice and may deviate from <strong>the</strong> Policy as determ<strong>in</strong>ed <strong>in</strong> its discretion.<br />

© Copyright 2009 Nancy Davis and Chrisann Lemery Sample Plan/Policy – Identity Theft Prevention Program<br />

Page 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!